Nothing Special   »   [go: up one dir, main page]

IL181358A0 - Identity theft protection and notification system - Google Patents

Identity theft protection and notification system

Info

Publication number
IL181358A0
IL181358A0 IL181358A IL18135807A IL181358A0 IL 181358 A0 IL181358 A0 IL 181358A0 IL 181358 A IL181358 A IL 181358A IL 18135807 A IL18135807 A IL 18135807A IL 181358 A0 IL181358 A0 IL 181358A0
Authority
IL
Israel
Prior art keywords
notification system
theft protection
identity theft
identity
protection
Prior art date
Application number
IL181358A
Original Assignee
Id Alarm Inc
Willis John A
Foster David W
Divjak Igor D
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Id Alarm Inc, Willis John A, Foster David W, Divjak Igor D filed Critical Id Alarm Inc
Publication of IL181358A0 publication Critical patent/IL181358A0/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Telephonic Communication Services (AREA)
  • Alarm Systems (AREA)
IL181358A 2004-08-20 2007-02-15 Identity theft protection and notification system IL181358A0 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US60288304P 2004-08-20 2004-08-20
US61765204P 2004-10-13 2004-10-13
US62647504P 2004-11-10 2004-11-10
PCT/CA2005/001265 WO2006017937A1 (en) 2004-08-20 2005-08-19 Identity theft protection and notification system

Publications (1)

Publication Number Publication Date
IL181358A0 true IL181358A0 (en) 2007-07-04

Family

ID=35907201

Family Applications (1)

Application Number Title Priority Date Filing Date
IL181358A IL181358A0 (en) 2004-08-20 2007-02-15 Identity theft protection and notification system

Country Status (9)

Country Link
EP (1) EP1779588A1 (en)
JP (1) JP2008512008A (en)
KR (1) KR20070063514A (en)
AU (1) AU2005274636A1 (en)
CA (1) CA2565177A1 (en)
IL (1) IL181358A0 (en)
MX (1) MX2007002024A (en)
NZ (1) NZ553284A (en)
WO (1) WO2006017937A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7540021B2 (en) 2000-04-24 2009-05-26 Justin Page System and methods for an identity theft protection bot
US20070093234A1 (en) * 2004-08-20 2007-04-26 Willis John A Identify theft protection and notification system
US8359278B2 (en) 2006-10-25 2013-01-22 IndentityTruth, Inc. Identity protection
KR101177363B1 (en) * 2011-11-29 2012-08-27 주식회사 이스턴웨어 System and method for tracking ip
WO2014030116A1 (en) * 2012-08-20 2014-02-27 Verified Ringtones (Pty) Ltd A system for the customized capturing, collation and verification of a subscriber's data for the purpose of transacting online and / or accessing databases

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0768521B2 (en) * 1987-10-07 1995-07-26 株式会社半導体エネルギー研究所 Liquid crystal electro-optical device
JPH08279007A (en) * 1995-04-06 1996-10-22 Horoson Tec:Kk Credit information inquiry management system and automatic settlement system for credit card
JPH1091682A (en) * 1996-09-11 1998-04-10 Nippon Telegr & Teleph Corp <Ntt> Card checking method and system
US6012144A (en) * 1996-10-08 2000-01-04 Pickett; Thomas E. Transaction security method and apparatus
JP3922482B2 (en) * 1997-10-14 2007-05-30 ソニー株式会社 Information processing apparatus and method
JP2001197189A (en) * 2000-01-06 2001-07-19 Takayuki Arai Method for emergency contact substitution service and information retrieval service with portable telephone and fixed telephone
JP2001217826A (en) * 2000-01-31 2001-08-10 Saison Information Systems Co Ltd Device and method for authenticating network
JP2001312469A (en) * 2000-05-01 2001-11-09 Ntt Data Corp Authenticating device
JP2002175490A (en) * 2000-12-06 2002-06-21 Mitsubishi Electric Corp Use management system and method for electronic information carrier
US7028052B2 (en) * 2001-05-10 2006-04-11 Equifax, Inc. Systems and methods for notifying a consumer of changes made to a credit report
JP2003152908A (en) * 2001-11-16 2003-05-23 Ntt Docomo Inc Credit card settlement type telephone terminal and user-monitoring method using the terminal
US20030195859A1 (en) * 2002-04-16 2003-10-16 Lawrence Jason E. System and methods for authenticating and monitoring transactions
JP2004151972A (en) * 2002-10-30 2004-05-27 Toppan Printing Co Ltd Device and method for authorizing use of credit card, and program

Also Published As

Publication number Publication date
CA2565177A1 (en) 2006-02-23
NZ553284A (en) 2010-06-25
WO2006017937A1 (en) 2006-02-23
EP1779588A1 (en) 2007-05-02
AU2005274636A1 (en) 2006-02-23
MX2007002024A (en) 2007-10-11
KR20070063514A (en) 2007-06-19
JP2008512008A (en) 2008-04-17

Similar Documents

Publication Publication Date Title
IL190507A0 (en) Identity theft and fraud protection system and method
GB0522086D0 (en) Filing security system and article security system
DE602006010468D1 (en) Vehicle theft protection and system
SG119237A1 (en) An intrusion protection system and method
EP1920338A4 (en) Network security systems and methods
EP1965539A4 (en) Authentication system and authentication device
EP1969757A4 (en) Dual cts protection systems and methods
EP1680760A4 (en) Authentication and tracking system
EP1744954A4 (en) Improved airport system for safety and security
GB2413914B (en) Systems and methods for mobile security and monitoring
GB2422984C (en) Call Notification System And Method
EP1866789A4 (en) Mobile data security system and methods
EP1779295A4 (en) Vulnerable road user protection system
ZA200609581B (en) Document creation and authentication system
HK1102149A1 (en) Authentication systems and authentication method
IL180593A0 (en) Anti-vehicle security system
EP1915719A4 (en) Information protection method and system
EP1836677A4 (en) Security and storage system and method
DE602004009033D1 (en) Safety and security system
EP1886124A4 (en) Security screening and support system
IL181358A0 (en) Identity theft protection and notification system
GB2410098B (en) Security system
HK1102836A1 (en) Security and emergency device
GB2410594B (en) Passive safety system and determination device
GB2433631B (en) Improved key and access system