Unlock instant, AI-driven research and patent intelligence for your innovation.

System, Method And Computer Program Product For Authenticating A Client

a client and computer program technology, applied in the field of systems and methods for authenticating clients, can solve the problems of ruined credit rating, intangible costs much higher, and theft-related crimes costing the u.s. economy fifty-three billion dollars annually, and achieve the effect of reducing the number of instances of identity theft and negative economic impa

Inactive Publication Date: 2012-12-06
SINGERLE JR GREGORY J
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

Effectively reduces instances of identity theft by providing a dynamic authentication process that is cost-neutral to organizations, enhancing security without negatively impacting market dynamics, and ensuring that each passcode can be used only a limited number of times to prevent unauthorized use.

Problems solved by technology

The FTC further estimates that fraud-related crimes cost the U.S. economy fifty-three billion dollars annually.
The intangible costs are much higher, including a ruined credit rating, inability to purchase large assets (e.g., home, car, etc.), denied employment, and emotional devastation.
The rampant spread of identity theft, such as that relating to credit application fraud, is primarily due to three reasons: (1) inadequate identification of applicants; (2) the lack of an economic incentive for various organizations to implement identity theft solutions; and (3) the widespread availability and ease of obtaining credit.
In this regard, conventional techniques for identifying applicants, including by name, address, Social Security number (SSN), date of birth or the like, are typically inadequate to avoid identity theft because of the overuse and ease with which this information can be obtained.
It has been shown that in many instances, a victim's personal information is stolen by a family member, coworker, housekeeper or other person personally known to the victim.
Regrettably, however, these over half-million people, as well as the others whose personal information is similarly stolen, have no recourse other than to sit back and wait to see if they become victims of identity theft.
In addition to the inadequate identification of applicants, as indicated above, the lack of an economic incentive for various organizations to implement identity theft solutions also typically plays a role in the rampant spread of identity theft.
As such, these organizations are typically reluctant to implement any measure that restricts such sales, even to make identity theft more difficult.
Further, from an economic standpoint, although the cost of identity theft to the U.S. economy and individual consumers far exceeds the cost of implementing identity theft solutions, the cost of implementing identity theft solutions for many organizations such as credit bureaus and credit issuers typically exceeds their cost of identity theft.
In this regard, it should be noted that the cost of preventing identity theft can exceed the cost of losses due to fraud since conventional techniques for reducing identity theft can have a negative impact on the overall market of credit issuers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, Method And Computer Program Product For Authenticating A Client
  • System, Method And Computer Program Product For Authenticating A Client
  • System, Method And Computer Program Product For Authenticating A Client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025]The present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which preferred embodiments of the invention are shown. This invention may, however, be embodied in many different, forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout.

[0026]Referring to FIG. 1, a system 10 for authenticating a client includes one or more clients 12, organizations 14 and authenticators 16 (one of each being shown). Each client is capable of directly and / or indirectly communicating with one or more organizations and authenticators. Similarly, each organization is capable of directly and / or indirectly communicating with one or more clients and authenticators; and each authenticator is capable of directly ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system, method and computer program product are provided for authenticating a user. The method includes receiving, such as from an authenticator, a set of at least one label identifying at least one element of an authentication matrix. The authentication matrix includes a plurality of elements, each element capable of being identified by a label. Then, a passcode is formulated, such as by the client, based upon the element(s) identified by the received set of label(s). Thereafter, the client is authenticated based upon the formulated passcode, such as by the authenticator. The set of label(s) can be received, the passcode can be formulated, and the client can be authenticated a plurality of times. In such instances, to permit the passcode to dynamically change, each set of label(s) received can differ from each previously received set of label(s).

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]The present application claims priority from U.S. Provisional Patent Application Ser. No. 60 / 457,357, entitled: METHOD AND SYSTEM PROVIDING A MEANS OF IDENTIFICATION, filed on Mar. 26, 2003, the contents of which are incorporated herein by reference in its entirety.FIELD OF THE INVENTION[0002]The present invention generally relates to systems and methods for authenticating a client and, more particularly, to systems, methods and computer program products for authenticating a client via a dynamic passcode.BACKGROUND OF THE INVENTION[0003]Identity theft has been one of the fastest-growing crimes in the United States in recent years. Approximately every forty-five seconds an American falls victim to identity theft. In fact, the Federal Trade Commission (FTC) estimates that approximately ten million Americans were victims of identity theft in 2002. Reports of this crime were the chief consumer complaint made to the FTC in 2001 and 2002, accou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/32
CPCH04L2209/56H04L9/3226
Inventor SINGERLE, JR., GREGORY J.
Owner SINGERLE JR GREGORY J