Unfortunately, with the convenience of each of the above credit cards, charge cards, debit cards, and / or currency or “smart” cards, savings accounts, checking accounts, automated teller
machine accounts, and cellular telephones or cellular communications devices, comes many disadvantages and the opportunity for theft and / or fraud.
Similarly, even in the absence of the physical card, an unauthorized individual may utilize the account number which corresponds to the card in order to make certain transactions.
While card holders are usually protected by various coverages which shield them from the liabilities associated with the fraudulent use of a card or the corresponding account number, the card issuers, credit, charge and / or
debit card issuing companies and / or institutions, and / or their insurance companies, end up paying for the above described thefts and / or fraudulent and / or unauthorized uses.
Ultimately, the
consumer also shoulders the burden of the costs associated with these thefts and / or fraudulent and / or unauthorized uses in the form of increased prices.
This current authorization practice fails to prevent the use of a lost or stolen card, or the unauthorized use of either the card or the account number corresponding thereof, if the card has not been reported, and / or discovered, to be lost, stolen or used without authorization and / or if the account
credit limit has not yet been reached.
In the case of currency or “smart” cards, which typically may serve as bearer instruments, the monetary credit on these cards may be completely depleted before the card owner even discovers same to be lost or stolen.
In the case of cellular telephones, recent practices involving “
cloning” cellular telephones, which entails intercepting telephone transmissions from a
cellular telephone, which transmissions contain the phone number of the transmitting phone and / or the associated
personal identification number (PIN), and utilizing the intercepted information to program a different cellular phone which by then be utilized in conjunction with the account of the “cloned”
cellular telephone, has also resulted in widespread theft and fraudulent use of cellular telephones and / or cellular communications devices The “cloned” telephones are typically sold on the “black” market.
In these instances, the cellular telephone owner has no way of knowing whether, or when, his or her cellular transmissions are being intercepted and / or if and when a “cloned” cellular phone is created and / or is utilized on, or over, his or her cellular telephone account.
Typically, the cellular telephone owner first becomes aware of the unauthorized usage of his or her cellular telephone account when he or she receives their telephone account statement.
At present, there is no apparatus or method for providing notification to the cellular telephone owner as to when his or her cellular telephone and / or
cellular telephone number is, or has been, utilized in an unauthorized manner.