US9152818B1 - Managing authentication based on contacting a consumer as soon as the consumer has performed an authentication operation - Google Patents
Managing authentication based on contacting a consumer as soon as the consumer has performed an authentication operation Download PDFInfo
- Publication number
- US9152818B1 US9152818B1 US13/339,585 US201113339585A US9152818B1 US 9152818 B1 US9152818 B1 US 9152818B1 US 201113339585 A US201113339585 A US 201113339585A US 9152818 B1 US9152818 B1 US 9152818B1
- Authority
- US
- United States
- Prior art keywords
- consumer
- identity
- entity
- authentication operation
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/082—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying multi-factor authentication
Definitions
- KBA knowledge-based authentication
- the person provides the organization with the answers to such questions up front (e.g., when opening an account with the organization).
- the organization is then able to save the answers, and re-ask one or more of the questions to authenticate the person at a later time.
- the organization may work with a KBA service provider.
- the organization identifies who the person claims to be to the KBA service provider.
- the KBA service provider retrieves previously gathered data on the person from one or more information sources (e.g., credit agencies, public records, commercially available information regulated by the Gramm, Leach, Bliley Act, etc.) and provides, to the organization, an appropriate set of questions based on that gathered data.
- the organization asks the person one or more of the questions and relays each answer back to the KBA service provider.
- the KBA service provider evaluates each provided answer and provides the organization with an authentication result (e.g., “passed authentication” or “failed authentication”).
- identity theft protection companies offer services which alert subscribers when the identity theft protection companies discover sharing of their subscribers' personal information. For example, when an identity theft protection company discovers illegal selling of a subscriber's personal information, the identity theft protection company may send an email message or call that subscriber. Unfortunately, by the time the subscriber's personal information is offered for sale, a significant amount of time may have passed since the subscriber's identity was stolen and used by a fraudster.
- An improved technique involves contacting a consumer (i.e., a human) as soon as a KBA service provider has communicated with an institutional entity to perform an authentication operation regarding the consumer (e.g., to open a credit card account, to open a line of credit at a store, etc.).
- a consumer i.e., a human
- an authentication operation e.g., to open a credit card account, to open a line of credit at a store, etc.
- the consumer can confirm that the consumer did in fact participate in the authentication operation.
- the consumer if the consumer indicates that the consumer did not participate in the authentication operation, the consumer now knows that the consumer's identity has been stolen and appropriate steps can be taken to protect the consumer before more time passes.
- One embodiment is directed to a method of managing consumer authentication.
- the method includes communicating with an institutional entity to perform an authentication operation regarding a consumer.
- the method further includes conveying a query to the consumer in response to the authentication operation.
- the query prompts the consumer to indicate whether the consumer participated in the authentication operation.
- the method further includes obtaining a response to the query indicating whether the consumer participated in the authentication operation.
- the authentication operation is legitimate when the response indicates that the consumer participated in the authentication operation.
- the authentication operation is fraudulent when the response indicates that the consumer did not participate in the authentication operation.
- the authentication operation involves knowledge-based authentication (e.g., asking the consumer to provide specific personal information that the consumer should know).
- a banking institution could obtain a set of KBA questions from an identity verification platform (e.g., via a web server of a KBA service provider) in order to authenticate a new bank customer when the new bank customer opens up a credit account.
- an identity verification platform e.g., via a web server of a KBA service provider
- Other situations are suitable for use as well.
- the query which prompts the consumer to indicate whether the consumer participated in the authentication operation is conveyed to the consumer through an identity protection entity which is different than the institutional entity.
- an identity protection entity which is different than the institutional entity.
- Such out-of-band querying of the consumer may be provided by the identity protection entity in the form of a subscribed notification service (e.g., the consumer may subscribe to such a service provided by an identity theft protection company).
- inventions are directed to systems, apparatus, processing circuits, computer program products, and so on. Some embodiments are directed to various procedures, electronic components and circuitry which are involved in managing consumer authentication and providing such a notification service.
- FIG. 1 is a block diagram of an electronic system which manages consumer authentication in accordance with the improved technique.
- FIG. 2 is a block diagram of an identify verification platform of the electronic system of FIG. 1 .
- FIG. 3 is a block diagram of particular details of a database of the identify verification platform of FIG. 2 .
- FIG. 4 is a sequence diagram showing various activity of the electronic system of FIG. 1 .
- FIG. 5 is a flowchart of a procedure which is performed by the identify verification platform of FIG. 2 .
- Improved techniques involve contacting a consumer (i.e., a human) as soon as a knowledge-based authentication (KBA) service provider has communicated with an institutional entity to perform an authentication operation regarding the consumer. Once the consumer is contacted, the consumer can confirm that the consumer did in fact participate in the authentication operation. Moreover, once the consumer is contacted, if the consumer indicates that the consumer did not participate in the authentication operation, the consumer now knows that the consumer's identity has been stolen and appropriate steps can be taken to protect the consumer before more time passes.
- KBA knowledge-based authentication
- FIG. 1 shows an electronic environment 20 which manages consumer authentication in accordance with the improved techniques.
- the electronic environment 20 includes institutional entity equipment 22 , identity theft protection entity equipment 24 , an identity verification platform 26 , a personal information source 28 , and a communications medium 30 .
- the electronic system 20 may further include additional devices such as a user device 32 operated by a consumer 34 , and so on.
- the institutional entity equipment 22 is operated by an institutional entity 40 and is constructed and arranged to conduct business with consumers 34 (i.e., people).
- the institutional entity equipment 22 may include servers, client devices, etc. which are under control of the institutional entity 40 .
- suitable institutional entities 40 include credit card companies, banking institutions, retail stores, brokerage institutions, and so on.
- the identity theft protection entity equipment 24 is operated by an identity theft protection entity 42 .
- the identity theft protection entity equipment 24 may include servers, client devices, etc. under control of the identity theft protection entity 42 .
- Such an entity is typically in the business of offering identity theft protection services to subscribers (e.g., monitoring for un-authorized uses of subscriber identities, monitoring for black-market sales of subscriber identities, etc.).
- the identity verification platform 26 is operated by an identity verification service provider 44 .
- Such a service provider offers KBA services to the institutional entity 40 .
- the identity verification service provider 44 provides sets of KBA questions to the institutional entity 40 to enable the institutional entity 40 to perform KBA operations with consumers 34 .
- the identity verification service provider 44 offers notification services to the identity theft protection entity 42 to notify the identity theft protection entity 42 when a particular consumer 34 , who is also a subscriber of the identity theft protection entity 42 , has participated in a KBA operation with the institutional entity 40 .
- the personal information source 28 provides the identity verification platform 26 with access to specific personal information of consumers 34 .
- suitable personal information sources 28 include credit card companies, credit bureaus, public registries and databases, and so on.
- the personal information source 28 is operated by an entity 46 which is separate from the institutional entity 40 and the identity theft protection entity 42 .
- the communications medium 30 connects the various components of the electronic environment 20 together to operate as a system and to enable these components to exchange electronic signals 48 (e.g., see the double arrow 48 ). At least a portion of the communications medium 30 is illustrated as a cloud to indicate that the communications medium 30 is capable of having a variety of different topologies including backbone, hub-and-spoke, loop, irregular, combinations thereof, and so on. Along these lines, the communications medium 30 may include copper-based data communications devices and cabling, fiber optic devices and cabling, wireless devices, combinations thereof, etc.
- the user device 32 represents an electronic apparatus which is operated by a consumer 34 .
- suitable electronic apparatus include a general purpose computer, a laptop or notebook computer, a tablet or hand held apparatus, a smart phone, a traditional telephone, and so on.
- that component may connect to the user device 32 of the consumer 34 through the communications medium 30 .
- the consumer 34 subscribes to an identity theft protection service of the identity theft protection entity 42 .
- the identity theft protection entity 42 indicates that, as part of an identity theft protection package purchased by the consumer 34 , it will notify the consumer 34 if the identity theft protection entity 42 becomes aware of any authentication operations regarding the consumer 34 .
- the identity theft protection entity equipment 24 then communicates with the identity verification platform 26 to inform the identity verification platform 26 that the consumer 34 subscribes to the notification service.
- the identity verification platform 26 configures itself to inform the identity theft protection entity equipment 24 if the identity verification platform 26 ever performs KBA regarding the consumer 34 .
- the institutional entity 40 receives an application from an applicant to open a new account (e.g., a loan application at a banking institution).
- the institutional entity equipment 22 communicates with the identity verification platform 26 to obtain a set of KBA questions to ask the applicant.
- the identity verification platform 26 retrieves information regarding the consumer 34 from the personal information source 28 in order to prepare an appropriate set of KBA questions for use by the institutional entity 40 in a KBA session.
- the identity verification platform 26 immediately informs the identity theft protection entity equipment 24 operated by identity theft protection entity 42 that an authentication operation regarding the consumer 34 has taken place.
- the identity theft protection entity 42 queries the consumer 34 as to whether the consumer 34 actually participated in the authentication operation.
- the identity theft protection entity equipment 24 may contact the consumer 34 via the user device 32 (e.g., via an email message, via an SMS message, via an actual telephone call, etc.).
- the identity theft protection entity equipment 24 simply informs the identity verification platform 26 of this fact.
- the identity verification platform 26 may then simply update its records or perhaps update its records in combination with sending a confirmation to the institutional entity 40 .
- the identity theft protection entity equipment 24 again informs the identity verification platform 26 .
- the identity verification platform 26 immediately informs the institutional entity 40 to allow the institutional entity 40 to take remedial action (e.g., perform an investigation, freeze the new account, etc.).
- the consumer 34 benefits by immediately thwarting a potential theft of the consumer's identity.
- the institutional entity 40 benefits by taking remedial action shortly after completing the authentication operation.
- the identity theft protection entity 42 benefits by offering an enriched service to its subscribers.
- other institutional entities 40 may benefit if these entities 40 agree to share such alerts among each other (e.g., as a federation of institutional entities 40 ).
- the electronic environment 20 may include multiple installations of institutional entity equipment 22 operated by multiple institutional entities 40 all of which work with the identity verification platform 26 operated by the identity verification service provider 44 in order to protect against fraudulent transactions (e.g., fraudster applicants, etc.).
- the identity verification platform 26 is equipped to provide the notification service and associated alerts to a federation of institutional entities 40 .
- the electronic environment 20 may include multiple installations of identity theft protection entity equipment 24 operated by multiple identity theft protection entities 42 all of which work with the identity verification platform 26 operated by the identity verification service provider 44 in order to provide an enhanced set of identity monitoring services to their subscribers.
- the electronic environment 20 may include multiple personal information sources 28 .
- personal information which initially may have been known by only a few may proliferate and become more publicly accessible over time. Accordingly, broadening the personal information sources will continue to provide new data for KBA.
- the electronic environment 20 may include multiple user devices 32 operated by multiple consumers 34 .
- the consumers 34 may become subscribers of one or more identity theft protection entities 42 , as well as deal with one or more institutional entities 40 . Further details will now be provided with reference to FIG. 2 .
- FIG. 2 shows particular details of the identity verification platform 26 which is operated by the identity verification service provider 44 .
- the identity verification platform 26 includes a network interface 60 , a web server 62 , a controller 64 and a database 66 .
- the network interface 60 is constructed and arranged to connect the identity verification platform 26 to the communications medium 30 . Accordingly, the identity verification platform 26 is able to communicate with the other components of the electronic environment 20 (also see FIG. 1 ).
- the web server 62 is constructed and arranged to work with the institutional entity equipment 22 .
- a representative of the institutional entity 40 accesses the web server 62 of the identity verification platform 26 to carry out a KBA operation on that person.
- the representative identifies who the person claims to be (i.e., which consumer 34 ) via web communications, and the web server 62 then accesses the personal information source 28 for personal information on who the person claims to be and provides the representative with an appropriate set of KBA questions based on that personal information.
- the web server 62 receives one or more answers to the set of KBA questions from the representative (who may be selecting one or more multiple choice options while communicating directly with the person).
- the web server 62 then provides the representative with an authentication result base on the one or more answers.
- the web server 62 is also configured to notify the controller 64 of the completion of such KBA operations.
- the controller 64 is constructed and arranged to communicate with the identity theft protection entity equipment 24 .
- the controller 64 is configured to immediately inform the identity theft protection entity equipment 24 of the KBA operation.
- the identity theft protection entity 42 operating that equipment 24 can then contact the consumer 34 to determine whether the KBA operation was legitimate. If it turns out that the consumer 34 was not the person who participated in the authentication operation, the controller 64 is immediately notified by the identity theft protection entity 42 and the controller 64 takes remedial action, e.g., alerts the institutional entity 40 .
- the database 66 manages and maintains consumer entries 70 regarding consumers 34 .
- Such entries 70 may include certain consumer identifying information such as names, respective postal addresses, dates of birth, social security number data (e.g., hashed last four digits), and so on (e.g., received from the personal information source 28 ). Additionally, the entries 70 may indicate whether the consumers 34 are subscribers of a particular identity theft protection entity 42 in order to enable the controller 64 to contact that particular identity theft protection entity 42 when attempting to verify recent KBA authentication operations carried out with one or more institutional entities 22 .
- the web server 62 and the controller 64 initially populate the database 66 as new consumers 34 are added and then are updated routinely. That is, new customers perform transactions with the institutional entities 40 and thus participate in KBA operations. Additionally, new subscribers subscribe to identity theft protection services offered by the identity theft protection entities 42 . Once the consumers 34 are added to the database 66 , the web server 62 and the controller 64 may update the database 66 based on communications with the institutional entities 40 and the identity theft protection entities 42 , e.g., to record new KBA activity, to add or change subscription information, and so on. Furthermore, the data within the entries 70 of the database 66 may be periodically updated with more current information from the personal information sources 28 as well.
- a computer program product 80 is capable of delivering all or portions of the software to the identity verification platform 26 .
- the computer program product 80 has a non-transitory (or non-volatile) computer readable medium which stores a set of instructions which controls one or more operations of the identity verification platform 26 .
- suitable computer readable storage media include tangible articles of manufacture and apparatus which store instructions in a non-volatile manner such as CD-ROM, flash memory, disk memory, tape memory, and the like. Further details will now be provided with reference to FIG. 3 .
- FIG. 3 shows a general format for the database 66 . It should be understood that this format is a logical representation and that the actual data may be stored in a variety of different ways (e.g., as a set of relational databases or tables, as linked lists, in a distributed manner, in separate databases, combinations thereof, etc.).
- the database 66 includes entries 70 ( 1 ), 70 ( 2 ), 70 ( 3 ), 70 ( 4 ), 70 ( 5 ), . . . (collectively, entries 70 shown as rows of a table).
- Each entry 70 corresponds to a particular consumer 34 (i.e., human) and includes name fields 100 , postal address fields 102 , date of birth fields 104 , personal information fields 106 , institutional entity fields 108 , identity theft protection entity fields 110 , and additional fields 112 (i.e., columns of the table).
- the name fields 100 store a consumer's name (e.g., last name, first name, middle name, etc.).
- the postal address fields 102 store the consumer's postal address (e.g., street, town/city, state, etc.).
- the date of birth fields 104 store the consumer's data of birth (e.g., MM/DD/YY).
- the personal information fields 106 store various personal information that has been gathered about the consumer 34 . Such information may have been obtained from the personal information sources 28 ( FIG. 1 ) and previously used for KBA operations. For example, the contents may indicate where the consumer 34 was married, the color of the consumer's first car, the name of the consumer's first pet, and so on. In this situation, the personal information fields 106 may contain data 120 indicating the particular sources of the personal information and whether each item of data has been used previously for a KBA operation.
- the institutional entity fields 108 store histories 122 of prior authentication operations performed by the institutional entities 42 involving the consumer 34 . These histories 122 may identify which institutional entities 42 performed authentication operations, the dates of the authentication operations, what questions were provided, what answers were provided, the authentication results, and so on.
- the identity theft protection entity fields 110 store data 124 identifying whether the consumer 34 subscribes to the above-described notification service with a particular identity theft protection entity 42 .
- the consumers 34 corresponding to entries 70 ( 1 ) and 70 ( 4 ) are not subscribers to the notification service.
- the consumer 34 corresponding to entry 70 ( 2 ) is a subscriber of the notification service through identity theft protection company “A”.
- the consumer 34 corresponding to entry 70 ( 3 ) is a subscriber of the notification service through identity theft protection company “B”.
- the consumer 34 corresponding to entry 70 ( 5 ) is a subscriber of both identity theft protection company “A” and identity theft protection company “B” in which the consumer 34 is able to receive notification through both companies.
- the additional fields 112 store a variety of miscellaneous data regarding the consumer 34 such as a user identifier (e.g., a searchable index or key), whether the consumer 34 has been marked invalid or marked inactive (e.g., due to detection of fraudulent activity), whether the consumer 34 is related to another consumer 34 or identified under an alias in another entry 70 , and so on. Further details regarding the operation of the notification service will now be provided with reference to FIG. 4 .
- a user identifier e.g., a searchable index or key
- whether the consumer 34 has been marked invalid or marked inactive e.g., due to detection of fraudulent activity
- the consumer 34 is related to another consumer 34 or identified under an alias in another entry 70 , and so on.
- FIG. 4 shows a sequence diagram 200 illustrating particular activities involved in providing the above-described notification service. Although time passes in the downward direction, the particular distance in the downward direction does not necessarily indicate any particular amount of time.
- a consumer 34 subscribes for the notification service by dealing with an identity theft protection entity 42 (see arrow 202 in FIG. 4 ).
- the consumer 34 signs up online via a browser session (also see the user device 32 and the identity theft protection entity equipment 24 in FIG. 1 ). In other arrangements, the consumer 34 signs up over the phone or in person with the identity theft protection entity 42 .
- the identity theft protection entity 42 informs the identity verification platform 28 that the consumer 34 has become a subscriber of the notification service (see arrow 204 ).
- the identity verification platform 28 responds by updating the database 66 (see fields 110 in FIG. 3 ).
- the notification service is in place to protect the consumer 34 .
- the transaction may be an in person transaction (e.g., an attempt to open an account), a telephone transaction (e.g., a telephone purchase), an online transaction (e.g., a web browser transaction), and so on.
- the institutional entity 40 may have an established procedure to perform a KBA operation with the consumer 34 as a precaution against fraud.
- the institutional entity 40 communicates with the identity verification platform 28 (see arrow 212 ).
- the institutional entity 40 requests that the identity verification platform 28 provide a KBA service to the institutional entity 40 .
- the institutional entity 40 obtains this KBA service through a series of web exchanges via the web server 62 (also see FIG. 2 ).
- the identity verification platform 28 searches one or more of the personal information sources 28 (see arrow 214 ) for personal information regarding the consumer 34 (i.e., who the consumer 34 claims to be). Recall that examples of suitable personal information sources 28 include credit bureaus, credit card companies, and so on. As a result, the identity verification platform 28 obtains such personal information (see arrow 216 ).
- the identity verification platform 28 Upon receipt of the personal information, the identity verification platform 28 generates an appropriate set of KBA questions (see arrow 218 ). The identity verification platform 28 provides the set of KBA questions to the institutional entity 40 (see arrow 220 ).
- the institutional entity 40 conducts an exchange 222 with the person claiming to be the consumer 34 .
- a representative of the institutional entity 40 asks one or more of the KBA questions (arrow 224 ) and receives an answer to each asked KBA question (arrow 226 ) from that person such as by reading from a web page and clicking multiple choice answers on the web page.
- the representative then sends the answered web page back to identity verification platform 28 for evaluation (arrow 228 ).
- identity verification platform 28 analyzes the answered web page and returns an authentication result (arrow 230 ).
- such evaluation involves a simple matching of provided answers to expected answers.
- such evaluation may involve generation of a risk score (i.e., a quantitative measurement of risk) and a comparison of the risk score to a predefined threshold to determine whether authentication is successful.
- the identity verification platform 28 performs a back-end procedure (arrow 240 ).
- the controller 64 of the identity verification platform 28 updates an entry 70 of the database 66 corresponding to the consumer 34 with the history of the KBA session and checks the entry 70 to determine whether the consumer 34 subscribes to the notification service (e.g., see the field 110 in FIG. 3 ).
- the identity verification platform 28 Since the consumer 34 does subscribe to the notification service (i.e., arrows 202 , 204 in FIG. 4 ), the identity verification platform 28 sends a query to the actual consumer 34 subscribing to the notification service. In particular, the query is carried out indirectly through the identity theft protection entity 42 . Along these lines, the identity verification platform 28 sends a notification message to the identity theft protection entity 42 (arrow 242 ). The notification message indicates that the consumer 34 recently participated in an authentication operation and asks the identity theft protection entity 42 to confirm this fact with the actual consumer 34 who subscribes to the notification service. In response, the identity theft protection entity 42 carries out an exchange 244 with the consumer 34 .
- the identity theft protection entity 42 informs the consumer 34 that it has discovered that an authentication operation was recently performed with someone claiming to be the consumer 34 and prompting the consumer 34 to indicate whether consumer 34 in fact participated (arrow 246 ). The consumer 34 then provides a response answering the query (arrow 248 ).
- Conveying the response may involve operation of the user device 32 operated by the consumer 34 (also see FIG. 1 ).
- the consumer 34 is queried via an email message leading with a link to a web page (e.g., the consumer 34 clicks on a link and then hits a web page button to answer the query).
- consumer 34 receives an SMS message and answers the SMS message.
- the consumer 34 receives a telephone call from a representative of the identity theft protection entity 42 and provides a verbal answer which is conveyed back to the identity verification platform 28 .
- the consumer 34 if the consumer 34 did in fact participate in the authentication operation with the institutional entity 40 , the consumer 34 provides a positive answer which simply confirms the legitimacy of the transaction. Accordingly, the consumer 34 is content in that his subscription to the notification service is working properly and his identity has been safeguarded by the notification service.
- the query serves as a notice that the consumer's identity may have been taken by a fraudster. Even so, the negative answer from the consumer 34 in response to the query immediately informs the identity theft protection entity 42 that the authentication operation was fraudulent (i.e., the arrow 248 ). Moreover, in response, the identity theft protection entity 42 immediately notifies the identity verification platform 28 (arrow 250 ) which, in turn, notifies the institutional entity 40 (arrow 252 ).
- the institutional entity 40 With the institutional entity 40 having been alerted and without very much time having passed, the institutional entity 40 is able to take remedial action (arrow 254 ).
- a banking institution may be able to prevent processing of a banking transaction or be able to recall the transaction within a limited time window.
- a credit card company may wait for the message (arrow 252 ) before issuing credit or activating a credit card, and so on.
- the identity verification platform 28 is able to take remedial action as well (arrow 256 ). For example, the identity verification platform 28 may update the database 66 to indicate that a fraudster may be attempting to pose as the consumer 34 . Additionally, the identity verification platform 28 may notify other institutional entities 40 (e.g., credit card companies, stores, banking institutions, etc.) of the fraudster thus enabling the other institutional entities 40 to beware of future transactions attempted by the fraudster (i.e., warning to a federation of institutional entities 40 ). Further details will now be provided with reference to FIG. 5 .
- institutional entities 40 e.g., credit card companies, stores, banking institutions, etc.
- FIG. 5 is a flowchart of a procedure 300 which is performed by the identify verification platform 28 when managing consumer authentication. Prior to step 302 , it is assumed that the actual consumer 34 has subscribed to the notification service via the identity theft protection entity 42 which in turn updated the identify verification platform 28 .
- the identify verification platform 28 communicates with an institutional entity 40 to perform an authentication operation regarding the consumer 34 .
- Such communication may occur when a representative of the institutional entity 40 conducts a KBA session with someone claiming to be the consumer 34 (also see arrows 210 through 230 in FIG. 4 ).
- the representative may conduct the KBA session while concurrently walking through a web session with the web server 62 of the identify verification platform 28 to obtain KBA questions, provide KBA answers, and obtain a KBA result.
- the identify verification platform 28 conveys a query to the consumer 34 in response to the authentication operation.
- the query prompts the consumer 34 to indicate whether the consumer 34 participated in the authentication operation.
- step 306 the identify verification platform 28 obtaining a response to the query indicating whether the consumer 34 participated in the authentication operation.
- the authentication operation is legitimate when the response indicates that the consumer 34 participated in the authentication operation.
- the authentication operation is fraudulent when the response indicates that the consumer 34 did not participate in the authentication operation.
- the identify verification platform 28 sends a notification message to an identity theft protection entity 42 to which the consumer 34 subscribes and that entity 42 obtains and returns an answer to the query. That is, the consumer 34 receives the notification service through the identity theft protection entity 42 as part of the consumer's subscription.
- an improved technique is directed to a notification service which involves contacting a consumer 34 as soon as a KBA service provider has communicated with an institutional entity 40 to perform an authentication operation regarding the consumer 34 (e.g., to open a credit card account, to open a line of credit at a store, etc.).
- an authentication operation e.g., to open a credit card account, to open a line of credit at a store, etc.
- the consumer 34 can confirm that the consumer 34 did in fact participate in the authentication operation.
- the consumer 34 is contacted, if the consumer 34 indicates that the consumer 34 did not participate in the authentication operation, the consumer 34 now knows that the consumer's identity has been stolen and appropriate steps can be taken to protect the consumer 34 before more time passes.
- the identify verification platform 28 was described above as including a web server 62 to facilitate KBA with institutional entities 40 .
- the identify verification platform 28 provides KBA session via other means (e.g., remote login sessions, via a specialized graphical user interface, via telephone, combinations thereof, and so on).
- the identify verification platform 28 was described above as accessing the personal information source 28 prior to generating a set of KBA questions. It should be understood that, in some arrangements, the identify verification platform 28 already has access to personal information (e.g., stored within the database 66 ) thus alleviating the need to always access the personal information source 28 .
- the identify verification platform 28 was described above as including different circuits to handle KBA and consumer notification, in other arrangements, the circuitry responsible for knowledge-based authentication is more tightly integrated with (e.g., implemented as part of the controller 64 ) the circuitry that notifies the identity theft protection entity 42 and receives answers from the identity theft protection entity 42 .
- the different circuits are further separated (e.g., reside in different devices). Such arrangements may provide certain advantages in connection with support, scalability, security, and so on. Such modifications and enhancements are intended to belong to various embodiments of the invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Entrepreneurship & Innovation (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Alarm Systems (AREA)
Abstract
Description
Claims (27)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/339,585 US9152818B1 (en) | 2011-12-29 | 2011-12-29 | Managing authentication based on contacting a consumer as soon as the consumer has performed an authentication operation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/339,585 US9152818B1 (en) | 2011-12-29 | 2011-12-29 | Managing authentication based on contacting a consumer as soon as the consumer has performed an authentication operation |
Publications (1)
Publication Number | Publication Date |
---|---|
US9152818B1 true US9152818B1 (en) | 2015-10-06 |
Family
ID=54203831
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/339,585 Active 2032-04-11 US9152818B1 (en) | 2011-12-29 | 2011-12-29 | Managing authentication based on contacting a consumer as soon as the consumer has performed an authentication operation |
Country Status (1)
Country | Link |
---|---|
US (1) | US9152818B1 (en) |
Cited By (84)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11240273B2 (en) | 2016-06-10 | 2022-02-01 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11244071B2 (en) | 2016-06-10 | 2022-02-08 | OneTrust, LLC | Data processing systems for use in automatically generating, populating, and submitting data subject access requests |
US11244367B2 (en) | 2016-04-01 | 2022-02-08 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11244072B2 (en) | 2016-06-10 | 2022-02-08 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11256777B2 (en) | 2016-06-10 | 2022-02-22 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11277448B2 (en) | 2016-06-10 | 2022-03-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11295316B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11301589B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Consent receipt management systems and related methods |
US11301796B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11308435B2 (en) | 2016-06-10 | 2022-04-19 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11328240B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11328092B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11334681B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Application privacy scanning systems and related meihods |
US11334682B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11336697B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11343284B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11341447B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Privacy management systems and methods |
US11347889B2 (en) | 2016-06-10 | 2022-05-31 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11354434B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11354435B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11361057B2 (en) | 2016-06-10 | 2022-06-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11366786B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11373007B2 (en) | 2017-06-16 | 2022-06-28 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11397819B2 (en) | 2020-11-06 | 2022-07-26 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11403377B2 (en) | 2016-06-10 | 2022-08-02 | OneTrust, LLC | Privacy management systems and methods |
US11409908B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US11410106B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Privacy management systems and methods |
US11416634B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11416589B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11416576B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11416590B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11418492B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11416636B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing consent management systems and related methods |
US11418516B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US11416109B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11416798B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11438386B2 (en) | 2016-06-10 | 2022-09-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11436373B2 (en) | 2020-09-15 | 2022-09-06 | OneTrust, LLC | Data processing systems and methods for detecting tools for the automatic blocking of consent requests |
US11444976B2 (en) | 2020-07-28 | 2022-09-13 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11442906B2 (en) | 2021-02-04 | 2022-09-13 | OneTrust, LLC | Managing custom attributes for domain objects defined within microservices |
US11449633B2 (en) | 2016-06-10 | 2022-09-20 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US11461722B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Questionnaire response automation for compliance management |
US11461500B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11468386B2 (en) | 2016-06-10 | 2022-10-11 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11468196B2 (en) | 2016-06-10 | 2022-10-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11475165B2 (en) | 2020-08-06 | 2022-10-18 | OneTrust, LLC | Data processing systems and methods for automatically redacting unstructured data from a data subject access request |
US11475136B2 (en) | 2016-06-10 | 2022-10-18 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US11494515B2 (en) | 2021-02-08 | 2022-11-08 | OneTrust, LLC | Data processing systems and methods for anonymizing data samples in classification analysis |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US11526624B2 (en) | 2020-09-21 | 2022-12-13 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
US11533315B2 (en) | 2021-03-08 | 2022-12-20 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11546661B2 (en) | 2021-02-18 | 2023-01-03 | OneTrust, LLC | Selective redaction of media content |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US11562097B2 (en) | 2016-06-10 | 2023-01-24 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11586762B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for auditing data request compliance |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11593523B2 (en) | 2018-09-07 | 2023-02-28 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11601464B2 (en) | 2021-02-10 | 2023-03-07 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
US11620142B1 (en) | 2022-06-03 | 2023-04-04 | OneTrust, LLC | Generating and customizing user interfaces for demonstrating functions of interactive user environments |
US11625502B2 (en) | 2016-06-10 | 2023-04-11 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11651402B2 (en) | 2016-04-01 | 2023-05-16 | OneTrust, LLC | Data processing systems and communication systems and methods for the efficient generation of risk assessments |
US11651106B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11651104B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US11687528B2 (en) | 2021-01-25 | 2023-06-27 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US11775348B2 (en) | 2021-02-17 | 2023-10-03 | OneTrust, LLC | Managing custom workflows for domain objects defined within microservices |
US11797528B2 (en) | 2020-07-08 | 2023-10-24 | OneTrust, LLC | Systems and methods for targeted data discovery |
US11921894B2 (en) | 2016-06-10 | 2024-03-05 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US12045266B2 (en) | 2016-06-10 | 2024-07-23 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US12052289B2 (en) | 2016-06-10 | 2024-07-30 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US12118121B2 (en) | 2016-06-10 | 2024-10-15 | OneTrust, LLC | Data subject access request processing systems and related methods |
US12136055B2 (en) | 2016-06-10 | 2024-11-05 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US12153704B2 (en) | 2021-08-05 | 2024-11-26 | OneTrust, LLC | Computing platform for facilitating data exchange among computing environments |
US12265896B2 (en) | 2020-10-05 | 2025-04-01 | OneTrust, LLC | Systems and methods for detecting prejudice bias in machine-learning models |
US12299065B2 (en) | 2016-06-10 | 2025-05-13 | OneTrust, LLC | Data processing systems and methods for dynamically determining data processing consent configurations |
US12353405B2 (en) | 2023-09-18 | 2025-07-08 | OneTrust, LLC | Systems and methods for targeted data discovery |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030097485A1 (en) * | 2001-03-14 | 2003-05-22 | Horvitz Eric J. | Schemas for a notification platform and related information services |
US20030195859A1 (en) * | 2002-04-16 | 2003-10-16 | Lawrence Jason E. | System and methods for authenticating and monitoring transactions |
US20040143546A1 (en) * | 2002-11-01 | 2004-07-22 | Wood Jeff A. | Easy user activation of electronic commerce services |
US20060271457A1 (en) * | 2005-05-26 | 2006-11-30 | Romain Martin R | Identity theft monitoring and prevention |
US20070043577A1 (en) * | 2005-08-16 | 2007-02-22 | Sheldon Kasower | Apparatus and method of enabling a victim of identity theft to resolve and prevent fraud |
US20080033845A1 (en) * | 2006-07-21 | 2008-02-07 | Mcbride Brian | Publication Subscription Service Apparatus And Methods |
US20080288299A1 (en) * | 2006-10-31 | 2008-11-20 | Genmobi Technologies, Inc. | System and method for user identity validation for online transactions |
US20090106846A1 (en) * | 2007-10-23 | 2009-04-23 | Identity Rehab Corporation | System and method for detection and mitigation of identity theft |
US20090222897A1 (en) * | 2008-02-29 | 2009-09-03 | Callisto, Llc | Systems and methods for authorization of information access |
US20090305670A1 (en) | 2008-06-10 | 2009-12-10 | Prairie Interactive Messaging | System and method for automated knowledge based authentication |
US20090305667A1 (en) * | 2007-04-24 | 2009-12-10 | Schultz Michael J | Method and system for mobile identity verification and security |
US7676433B1 (en) | 2005-03-24 | 2010-03-09 | Raf Technology, Inc. | Secure, confidential authentication with private data |
US7739733B2 (en) | 2005-11-02 | 2010-06-15 | Emc Corporation | Storing digital secrets in a vault |
US20110131123A1 (en) * | 2009-12-01 | 2011-06-02 | Bank Of America Corporation | Comprehensive suspicious activity monitoring and alert system |
US20120191621A1 (en) * | 2009-07-31 | 2012-07-26 | Anakam, Inc. | System and Method for Strong Remote Identity Proofing |
US20120310702A1 (en) | 2011-06-03 | 2012-12-06 | Uc Group Limited | Systems and methods for monitoring compulsive behavior and for identifying early warning indicators across multiple websites |
-
2011
- 2011-12-29 US US13/339,585 patent/US9152818B1/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030097485A1 (en) * | 2001-03-14 | 2003-05-22 | Horvitz Eric J. | Schemas for a notification platform and related information services |
US20030195859A1 (en) * | 2002-04-16 | 2003-10-16 | Lawrence Jason E. | System and methods for authenticating and monitoring transactions |
US20040143546A1 (en) * | 2002-11-01 | 2004-07-22 | Wood Jeff A. | Easy user activation of electronic commerce services |
US7676433B1 (en) | 2005-03-24 | 2010-03-09 | Raf Technology, Inc. | Secure, confidential authentication with private data |
US20060271457A1 (en) * | 2005-05-26 | 2006-11-30 | Romain Martin R | Identity theft monitoring and prevention |
US20070043577A1 (en) * | 2005-08-16 | 2007-02-22 | Sheldon Kasower | Apparatus and method of enabling a victim of identity theft to resolve and prevent fraud |
US7739733B2 (en) | 2005-11-02 | 2010-06-15 | Emc Corporation | Storing digital secrets in a vault |
US20080033845A1 (en) * | 2006-07-21 | 2008-02-07 | Mcbride Brian | Publication Subscription Service Apparatus And Methods |
US20080288299A1 (en) * | 2006-10-31 | 2008-11-20 | Genmobi Technologies, Inc. | System and method for user identity validation for online transactions |
US20090305667A1 (en) * | 2007-04-24 | 2009-12-10 | Schultz Michael J | Method and system for mobile identity verification and security |
US20090106846A1 (en) * | 2007-10-23 | 2009-04-23 | Identity Rehab Corporation | System and method for detection and mitigation of identity theft |
US20090222897A1 (en) * | 2008-02-29 | 2009-09-03 | Callisto, Llc | Systems and methods for authorization of information access |
US20090305670A1 (en) | 2008-06-10 | 2009-12-10 | Prairie Interactive Messaging | System and method for automated knowledge based authentication |
US20120191621A1 (en) * | 2009-07-31 | 2012-07-26 | Anakam, Inc. | System and Method for Strong Remote Identity Proofing |
US20110131123A1 (en) * | 2009-12-01 | 2011-06-02 | Bank Of America Corporation | Comprehensive suspicious activity monitoring and alert system |
US20120310702A1 (en) | 2011-06-03 | 2012-12-06 | Uc Group Limited | Systems and methods for monitoring compulsive behavior and for identifying early warning indicators across multiple websites |
Cited By (113)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12288233B2 (en) | 2016-04-01 | 2025-04-29 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11651402B2 (en) | 2016-04-01 | 2023-05-16 | OneTrust, LLC | Data processing systems and communication systems and methods for the efficient generation of risk assessments |
US11244367B2 (en) | 2016-04-01 | 2022-02-08 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11468386B2 (en) | 2016-06-10 | 2022-10-11 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US12158975B2 (en) | 2016-06-10 | 2024-12-03 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US11277448B2 (en) | 2016-06-10 | 2022-03-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11295316B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11301589B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Consent receipt management systems and related methods |
US11301796B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11308435B2 (en) | 2016-06-10 | 2022-04-19 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11328240B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11328092B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11334681B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Application privacy scanning systems and related meihods |
US11334682B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11336697B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11343284B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11341447B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Privacy management systems and methods |
US11347889B2 (en) | 2016-06-10 | 2022-05-31 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11354434B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11354435B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11361057B2 (en) | 2016-06-10 | 2022-06-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11366786B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11960564B2 (en) | 2016-06-10 | 2024-04-16 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US12299065B2 (en) | 2016-06-10 | 2025-05-13 | OneTrust, LLC | Data processing systems and methods for dynamically determining data processing consent configurations |
US11403377B2 (en) | 2016-06-10 | 2022-08-02 | OneTrust, LLC | Privacy management systems and methods |
US11409908B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US11468196B2 (en) | 2016-06-10 | 2022-10-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11416634B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11416589B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11416576B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11416590B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11418492B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11416636B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing consent management systems and related methods |
US11418516B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US11416109B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11416798B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11438386B2 (en) | 2016-06-10 | 2022-09-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11244072B2 (en) | 2016-06-10 | 2022-02-08 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11921894B2 (en) | 2016-06-10 | 2024-03-05 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US12216794B2 (en) | 2016-06-10 | 2025-02-04 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US11449633B2 (en) | 2016-06-10 | 2022-09-20 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US11461722B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Questionnaire response automation for compliance management |
US11461500B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11868507B2 (en) | 2016-06-10 | 2024-01-09 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11410106B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Privacy management systems and methods |
US11256777B2 (en) | 2016-06-10 | 2022-02-22 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US11488085B2 (en) | 2016-06-10 | 2022-11-01 | OneTrust, LLC | Questionnaire response automation for compliance management |
US12204564B2 (en) | 2016-06-10 | 2025-01-21 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11475136B2 (en) | 2016-06-10 | 2022-10-18 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US12190330B2 (en) | 2016-06-10 | 2025-01-07 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US12164667B2 (en) | 2016-06-10 | 2024-12-10 | OneTrust, LLC | Application privacy scanning systems and related methods |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11847182B2 (en) | 2016-06-10 | 2023-12-19 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11544405B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US12026651B2 (en) | 2016-06-10 | 2024-07-02 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11550897B2 (en) | 2016-06-10 | 2023-01-10 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11551174B2 (en) | 2016-06-10 | 2023-01-10 | OneTrust, LLC | Privacy management systems and methods |
US11556672B2 (en) | 2016-06-10 | 2023-01-17 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11558429B2 (en) | 2016-06-10 | 2023-01-17 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US12147578B2 (en) | 2016-06-10 | 2024-11-19 | OneTrust, LLC | Consent receipt management systems and related methods |
US11562097B2 (en) | 2016-06-10 | 2023-01-24 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11586762B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for auditing data request compliance |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US12045266B2 (en) | 2016-06-10 | 2024-07-23 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US12136055B2 (en) | 2016-06-10 | 2024-11-05 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11609939B2 (en) | 2016-06-10 | 2023-03-21 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US12118121B2 (en) | 2016-06-10 | 2024-10-15 | OneTrust, LLC | Data subject access request processing systems and related methods |
US12086748B2 (en) | 2016-06-10 | 2024-09-10 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11625502B2 (en) | 2016-06-10 | 2023-04-11 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11645418B2 (en) | 2016-06-10 | 2023-05-09 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11645353B2 (en) | 2016-06-10 | 2023-05-09 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11244071B2 (en) | 2016-06-10 | 2022-02-08 | OneTrust, LLC | Data processing systems for use in automatically generating, populating, and submitting data subject access requests |
US11651106B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11651104B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US12052289B2 (en) | 2016-06-10 | 2024-07-30 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11240273B2 (en) | 2016-06-10 | 2022-02-01 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11663359B2 (en) | 2017-06-16 | 2023-05-30 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US11373007B2 (en) | 2017-06-16 | 2022-06-28 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US11593523B2 (en) | 2018-09-07 | 2023-02-28 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11947708B2 (en) | 2018-09-07 | 2024-04-02 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11797528B2 (en) | 2020-07-08 | 2023-10-24 | OneTrust, LLC | Systems and methods for targeted data discovery |
US11968229B2 (en) | 2020-07-28 | 2024-04-23 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11444976B2 (en) | 2020-07-28 | 2022-09-13 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11475165B2 (en) | 2020-08-06 | 2022-10-18 | OneTrust, LLC | Data processing systems and methods for automatically redacting unstructured data from a data subject access request |
US11704440B2 (en) | 2020-09-15 | 2023-07-18 | OneTrust, LLC | Data processing systems and methods for preventing execution of an action documenting a consent rejection |
US11436373B2 (en) | 2020-09-15 | 2022-09-06 | OneTrust, LLC | Data processing systems and methods for detecting tools for the automatic blocking of consent requests |
US11526624B2 (en) | 2020-09-21 | 2022-12-13 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
US12265896B2 (en) | 2020-10-05 | 2025-04-01 | OneTrust, LLC | Systems and methods for detecting prejudice bias in machine-learning models |
US11397819B2 (en) | 2020-11-06 | 2022-07-26 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11615192B2 (en) | 2020-11-06 | 2023-03-28 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US12277232B2 (en) | 2020-11-06 | 2025-04-15 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11687528B2 (en) | 2021-01-25 | 2023-06-27 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
US12259882B2 (en) | 2021-01-25 | 2025-03-25 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
US11442906B2 (en) | 2021-02-04 | 2022-09-13 | OneTrust, LLC | Managing custom attributes for domain objects defined within microservices |
US11494515B2 (en) | 2021-02-08 | 2022-11-08 | OneTrust, LLC | Data processing systems and methods for anonymizing data samples in classification analysis |
US11601464B2 (en) | 2021-02-10 | 2023-03-07 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
US11775348B2 (en) | 2021-02-17 | 2023-10-03 | OneTrust, LLC | Managing custom workflows for domain objects defined within microservices |
US11546661B2 (en) | 2021-02-18 | 2023-01-03 | OneTrust, LLC | Selective redaction of media content |
US11533315B2 (en) | 2021-03-08 | 2022-12-20 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US11816224B2 (en) | 2021-04-16 | 2023-11-14 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US12153704B2 (en) | 2021-08-05 | 2024-11-26 | OneTrust, LLC | Computing platform for facilitating data exchange among computing environments |
US11620142B1 (en) | 2022-06-03 | 2023-04-04 | OneTrust, LLC | Generating and customizing user interfaces for demonstrating functions of interactive user environments |
US12353405B2 (en) | 2023-09-18 | 2025-07-08 | OneTrust, LLC | Systems and methods for targeted data discovery |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9152818B1 (en) | Managing authentication based on contacting a consumer as soon as the consumer has performed an authentication operation | |
US20230045378A1 (en) | Non-repeatable challenge-response authentication | |
CN113168637B (en) | Method and system for secondary fraud detection during transaction verification | |
US11301855B2 (en) | Data verification in transactions in distributed network | |
US9218594B2 (en) | Social network-assisted electronic payments | |
CA3145504C (en) | Asset transaction system for enabling transparent transaction history management | |
US9100438B2 (en) | Shared identity profile management | |
US7761384B2 (en) | Strategy-driven methodology for reducing identity theft | |
AU2013262481B2 (en) | Multi-channel customer identification | |
US20150170148A1 (en) | Real-time transaction validity verification using behavioral and transactional metadata | |
US20150106216A1 (en) | Methods systems and computer program products for verifying consumer identity during transaction | |
US20030195859A1 (en) | System and methods for authenticating and monitoring transactions | |
CA2781510A1 (en) | Systems and methods for gesture-based interaction with computer systems | |
US20160335675A1 (en) | Binding social account interactions to a master agnostic identity | |
CN105723392A (en) | Transaction authentication | |
US20090125440A1 (en) | Method and system for approving credit card transactions | |
US20220191194A1 (en) | Identity-linked device information for user identification and transaction personalization via mobile tagging | |
US20130152155A1 (en) | Providing user attributes to complete an online transaction | |
WO2021027146A1 (en) | Payment method and apparatus, calculation device, and storage medium | |
CN109872223B (en) | Virtual article transaction method, device, equipment and storage medium | |
WO2015152905A1 (en) | Using challenge questions for user authentication | |
US11205161B2 (en) | System and method for electronic receipt services | |
KR20180005166A (en) | Methods and systems for identity verification in self-service machines | |
CN112632004A (en) | User identity recognition method and device based on behavior data acquisition | |
US11797997B2 (en) | Data verification in transactions in distributed network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HATHAWAY, MATTHEW R.;KNAUSS, BRYAN;SIGNING DATES FROM 20120316 TO 20120319;REEL/FRAME:027903/0205 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT, TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001 Effective date: 20160907 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT, NORTH CAROLINA Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001 Effective date: 20160907 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLAT Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001 Effective date: 20160907 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., A Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001 Effective date: 20160907 |
|
AS | Assignment |
Owner name: EMC IP HOLDING COMPANY LLC, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EMC CORPORATION;REEL/FRAME:040203/0001 Effective date: 20160906 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., T Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:053546/0001 Effective date: 20200409 |
|
AS | Assignment |
Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: MOZY, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: MAGINATICS LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: FORCE10 NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: EMC IP HOLDING COMPANY LLC, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL SYSTEMS CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL SOFTWARE INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL MARKETING L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL INTERNATIONAL, L.L.C., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: CREDANT TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: AVENTAIL LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 |
|
AS | Assignment |
Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 |
|
AS | Assignment |
Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |