Security and identity verification system and architecture

Information

  • Patent Grant
  • 10896472
  • Patent Number
    10,896,472
  • Date Filed
    Tuesday, November 13, 2018
    6 years ago
  • Date Issued
    Tuesday, January 19, 2021
    4 years ago
Abstract
Embodiments of a security and identity verification system are disclosed. The security and identity verification system may comprise a system that conducts automated identify verification of tax filers and generates electronic alerts to send to tax filers upon filing of a tax form with a tax service provider. The tax fraud alert system may also provide remediation services in coordination with tax service providers in the event a fraudulent form is filed; and/or validate tax identity information and the corresponding good or best tax filer contact information in order to notify the tax filer in a timely manner.
Description
LIMITED COPYRIGHT AUTHORIZATION

A portion of the disclosure of this patent document includes material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyrights whatsoever.


FIELD OF THE DISCLOSURE

The present disclosure generally relates to information security for tax filings in a computer environment.


BACKGROUND OF THE DISCLOSURE

In recent years, the number of third party, unwanted intrusions into private computing environments has continued to increase. These intrusions may come in a variety of forms, such as malicious third party systems attempting to emulate or impersonate the systems of a standard user. Such intrusions can be very disruptive and may, for example, immobilize operations, allow for the unauthorized access to sensitive data, or allow for the embezzlement of a user's account and corresponding funds.


SUMMARY OF EXAMPLE EMBODIMENTS

Various systems and methods are disclosed which include features relating to security and identity verification systems and architectures to analyze and detect unauthorized third party intrusions and/or access.


The systems, methods, and devices of the disclosure each have several innovative aspects, no single one of which is solely responsible for the desirable attributes disclosed herein.


In one embodiment, a fraud detection and alert system is disclosed. The fraud detection and alert system may comprise: one or more data stores configured to store computer-executable instructions; a network interface configured to communicate with a plurality of network service devices; and one or more physical computer processors in communication with the one or more data stores, wherein the computer-executable instructions, when executed, configure the one or more processors to: receive, via the network interface, an electronic request for a filing of an application, wherein the electronic request is associated with a first user and includes user data associated with the first user; match, based on the electronic request, the user data associated with the first user to verification data stored in one or more searchable databases, wherein the verification data is associated with the first user; transmit notification to first user device associated with the first user regarding the successful application filing of the first user's application; receive an indication from the first user device indicating a possible fraudulent electronic request; determine, based on the indication, that the electronic request is fraudulent; and generate electronic instructions to stop the filing of the application as requested by the electronic requests.


In another embodiment, a computerized method for detecting fraudulent tax filings is disclosed. The computerized method may comprise: receiving, via a network interface, an electronic request for a filing of an application, wherein the electronic request is associated with a first user and includes user data associated with the first user; matching, based on the electronic request and using one or more computer processors, the user data associated with the first user to verification data stored in one or more searchable databases, wherein the verification data is associated with the first user; transmitting, via one or more computer processors, notification to first user device associated with the first user regarding the successful application filing of the first user's application; receiving, via a network interface, an indication from the first user device indicating a possible fraudulent electronic request; determining, via one or more computer processors, based on the indication, that the electronic request is fraudulent; and generating, via one or more computer processors, electronic instructions to stop the filing of the application as requested by the electronic request.


In a further embodiment, a non-transitory storage medium for storing instructions adapted to be executed by a processor to perform a method for automatically detecting fraudulent tax filings is disclosed. The instructions may comprise: receiving an electronic request for a filing of an application, wherein the electronic request is associated with a first user and includes user data associated with the first user; matching, based on the electronic request, the user data associated with the first user to verification data stored in one or more searchable databases, wherein the verification data is associated with the first user; transmitting notification to first user device associated with the first user regarding the successful application filing of the first user's application; receiving an indication from the first user device indicating a possible fraudulent electronic request; determining based on the indication, that the electronic request is fraudulent; and generating electronic instructions to stop the filing of the application as requested by the electronic request.


Although certain embodiments and examples are disclosed herein, the subject matter extends beyond the examples in the specifically disclosed embodiments to other alternative embodiments and/or uses, and to modifications and equivalents thereof.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1A illustrates example embodiments of a security and identity verification system.



FIG. 1B illustrates example embodiments of a tax fraud alert system.



FIGS. 1C-1, 1C-2, 1D, and 1E illustrate example processes that can be implemented by embodiments of one or more components of the tax fraud alert system.



FIG. 2A illustrates example embodiments of an identity verification engine.



FIG. 2B illustrates example embodiments of a contact engine.



FIG. 2C illustrates example embodiments of an alert notification engine.



FIGS. 2D-1 and 2D-2 illustrate flow diagrams for embodiments of call center support processes.



FIG. 2E illustrates a flow diagram for embodiments of a web portal support process.



FIG. 2F illustrates a flow diagram for embodiments of a dispute process.



FIG. 3 illustrates an embodiment of a computing system which may implement example embodiments of one or more components of the tax fraud alert system.





Throughout the drawings, reference numbers are re-used to indicate correspondence between referenced elements. The drawings are provided to illustrate embodiments of the subject matter described herein and not to limit the scope thereof.


Although certain embodiments and examples are disclosed herein, the subject matter extends beyond the examples in the specifically disclosed embodiments to other alternative embodiments and/or uses, and to modifications and equivalents thereof.


DETAILED DESCRIPTION OF VARIOUS EMBODIMENTS

A. Overview


Tax authorities such as a state or federal government continuously combat fraudulent activities such as noncompliance, evasion, identity theft and refund fraud. Unfortunately, despite widespread government crackdowns, fraudsters are finding new and creative ways to defraud the government and legitimate taxpayers. For example, some individuals and groups acquire personally identifiable information (PII) from the deceased, dumpster dive, hack financial systems, buy information from someone not filing a return or otherwise steal it from legitimate sources such as a doctor's office. This PII can then be used to fill out tax returns, add fraudulent income information, and request false deductions.


Fake returns and identity theft cause the government to lose billions of dollars. For example, during the first nine months of 2016, the Federal tax authority flagged roughly 787,000 fake returns claiming $4 billion in refunds, and 237,750 taxpayers filed affidavits saying they, too, were victims of tax identity theft. (See https://www.irs.gov/newsroom/irs-security-summit-partners-expand-identity-theft-safeguards-for-2017-filing-season-build-on-2016-successes). According to a May 2014 Governing Institute research study of 129 state and local government officials, 43 percent of respondents cited identity theft as the biggest challenge their agency faces regarding tax return fraud. Nationwide, stealing identities and filing for tax refunds is one of the fastest-growing nonviolent criminal activities. Although federal agencies and some states have been able to start reducing identity theft tax refund fraud for individuals, tax refund fraud involving businesses is on the rise. These activities burden government agencies and rob taxpayers by preventing returns from reaching the right people. Clearly, tax fraud through identity theft is still a major issue facing the tax authorities and taxpayers.


Most recently in a June 2017 report by the Electronic Tax Administration Advisory Committee (ETAAC) published by the Internal Revenue Service (IRS), Identity Theft Tax Refund Fraud (IDTTRF) was described as a tough problem for tax authorities to solve. The report went further to say that criminals are incentivized by the potential availability of billions of dollars in refunds, particularly driven by refundable tax credits intended to help low and moderate-income Americans. The criminals are smart, nimble, motivated and well-funded.


Tax collection agencies, such as tax authorities at the local, state, and federal level, combined continue to lose billions of dollars in tax refund fraud. Tax service providers (TSPs), such as the tax collection agencies or a private tax preparation organization such as Intuit, H&R Block, or other tax preparation business, are well-aware of the magnitude of the tax fraud problem. However, budgetary constraints and legal mandates have created a system that is often unable to follow up on the red flags until after a refund check has been sent. In addition, the consumer or customers' identities and ability to receive a timely return may be put at risk in the process. Some TSPs continue to expand filters used to detect identity theft tax refund fraud. Tax returns identified by these filters can be held during processing until the TSPs can verify the taxpayers' identities. This filtering approach, however, is problematic because it focuses only on fraud detection rather than proactively informing a tax payer of a tax filing to enable prevention. Further, as tax-refund fraud has soared and hit a whopping $21 billion in 2016, up from just $6.5 billion two years ago, the problem of tax-refund fraud is growing quickly and is compounded by an outdated fraud-detection system that has trouble identifying many attempts to trick it. Although federal agencies and some states have been able to start reducing identity theft tax refund fraud for individuals, tax refund fraud involving businesses is on the rise.


Security practices can have a significant impact on the tax experience and taxpayer behavior. Improving the taxpayer experience may require sustained creativity and focus for a TSP to build systems that are both secure and, conversely, easy to access and use from a taxpayer perspective. A system that is secure, but that few can use, may not be successful for a TSP as it expands some of its key online services. Thus, in some embodiments, a TSP may strive to achieve a situation where services are both secure and easy to use and access. For example, a TSP may benefit from a system that provides more intelligent and customizable fraud detection checks to inform the TSP, before a refund check is processed and mailed out or sent to a direct deposit account, that a tax transaction is at risk of being fraudulent, and/or provides multiple channels to notify their tax payers or customers proactively of both legitimate and fraudulent returns. Further, consumers may also benefit from a system which can: preemptively notify them that tax forms have been filed with their tax identifier (ID) or their business' tax ID regardless of whether they have been flagged as a potential fraudulent tax filing; provide a channel via online or through call centers to contact the IRS or its proxy to remediate the issue if they believe the tax filing is fraudulent; and/or provide a system to track the progress of their cases.


To provide an improved computer system for detecting and alerting tax frauds, embodiments of a security and identity verification system or tax fraud alert system described herein promotes a more proactive and interactive relationship between the taxpayer and government employees to improve taxpayer service, enforcement and operations. Instead of the typical approach of trying to enhance detection of fraudulent tax form submissions, this solution aims to send positive notifications to tax payers when their tax return is filed and/or when any tax form is filed using the tax payers' individual tax ID or business tax ID(s). In some embodiments, the solution can leverage data from one or more credit bureaus and other data sources and algorithms to find good or even the best contact information for a tax payer and send the tax alerts. In some embodiments, the solution can also leverage other software suites and call centers to handle callbacks from users that received a tax alert and suspect fraud or have questions.


As an example, in some embodiments, a portion of the tax fraud alert system can be run at data centers of a tax authority if the tax authority's integration model does not allow non-public personal information (NPPI) data from tax forms to leave their premises, or where the some or all portions of the NPPI data can leave the premise, the system can offer a set of Application Programming Interfaces (APIs)/batch processes to send a subset of NPPI data from tax forms to another entity for the system to determine the correct identity(ies) tied to the individual tax ID or business tax ID in the tax form, selecting contact information to send the tax alert, and/or for handling customer support for those that receive a tax alert. While processing the NPPI submitted, in some embodiments, the system may also perform various types of fraud checks. Some example fraud checks can include: SSN check, multiple submissions to the same address (velocity of the same address being used), multiple submissions to the same bank account, verify against deceased records, communication checks (email, phone numbers, residential address), checking NPPI data in the tax filing against the credit bureau data to look for discrepancies and to verify communication channels, and/or a combination of positive activity tax alerts to all consumers or customers filing taxes and customizable fraud checks.


By notifying the taxpayer that their identity, tax ID, or business tax ID has been used to file a tax form, the consumer can respond to tax authorities and stop the process if they have not submitted a tax form. This proactive communication can prevent loss of tax refunds associated with identity fraud, significantly reduce fraudulent or unauthorized individual or business tax filings whether a refund is involved or not, and alert taxpayers to possible identity theft. In addition, in the June 2017 Electronic Tax Administration Advisory Committee (ETAAC) report published by IRS, the committee cited among its principal recommendations in addressing identity based tax fraud the need to improve authentication practices, including using innovative pilots and finding a replacement solution for the outmoded 2016 AGI/PIN e-file signature verification.


As further described herein, embodiments of the tax fraud alert system can use Personally Identifiable Information (PII) to verify a taxpayer's identity. For example, the PII used on the tax filing can be verified as belonging to the legitimate taxpayer through an independent verification process. Once the legitimate taxpayer is located, the most recent contact information including landline or mobile phone number, mailing address, and/or email associated with the legitimate taxpayer can be sent an alert notifying the taxpayer that a tax return has been filed with the taxpayer's credentials. If the legitimate taxpayer has not submitted a filing, the taxpayer can be provided with an option to contact the tax authority's customer service center or visit a web portal to get more information, and if necessary initiate a dispute and potentially stop payment of any tax refunds tied to the tax filing. The tax fraud alert system can offer a branded call center and/or a branded web portal to handle customers' or tax payers' inquiries about the tax alerts.


In some embodiments, the function of the tax fraud alert system can be twofold—(1) the successful delivery of the tax alert can serve to confirm the legitimate tax payer has filed the return and/or (2) the verification process ensures delivery of alerts to the legitimate taxpayer which results in additional information that can be useful in the overall review of the tax filing. TSP can be provided with a result from the taxpayer verification process, such as, for example, no taxpayer verified through information provided, taxpayer found to be deceased, or taxpayer/location found to be prison. One or more of these results may allow a tax authority to take next steps in the return evaluation process independent of taxpayer response to alerts or content of alerts generated.


Advantageously, in some embodiments, the alert does not add any additional time for processing, but may even shorten the time for processing because if a legitimate taxpayer receives the alert and notifies a tax authority that the taxpayer did not submit the tax filing in question, the tax filing can be sent immediately to fraud prevention for further evaluation. Unlike some existing tax fraud prevention efforts requiring the taxpayer to first obtain a PIN from the TSP to submit it in a tax form, in some embodiments, this tax fraud alert system does not require any taxpayer interaction to be in effect. The legitimate taxpayer does not have to opt-in in order to receive a notification that a tax form has been filed using tax ID or business tax ID that belongs to him or her.


In some embodiments, before sending a taxpayer filing alert, another entity (such as, for example, a credit bureau) can independently verify identity of the taxpayer, and independently locate and verify a mobile phone and/or other contact information associated with the legitimate taxpayer and/or find the best mobile phone number and other contact information. In some embodiments, alerts may only be sent if both the taxpayer and contact information can be verified. If taxpayer receiving the tax alert has submitted a tax form in his or her name or on behalf of a business, then he or she does not have to take any action. The majority of alerts may serve as a notification with no action required. If the taxpayer has not filed any tax form, the taxpayer can be provided with a call center number to contact for remediation efforts. The alerting process, while largely frictionless to the taxpayer, becomes an indispensable, proactive tool in combatting identity theft tax return fraud at the onset.



FIG. 1A illustrates an example embodiment of a security and identity verification system 100 which can be used to provide tax alerts. The exemplary security and identity verification system 100 includes a set of third party systems 110 which communicate with a tax fraud alert system 120 and with tax payer/tax filer systems 130 via a communications network 140. It is recognized that in some fraudulent situations, the tax payer and the tax filer are not the same entity, but the use of the term “tax filer” herein is meant to apply to the tax payer and not a fraudulent tax filer.


The security and identity verification system 100 may include multiple third party system 110 which communicate with the tax fraud alert system 120, such as to submit data, provide information on filed tax returns, and receive alerts for possible tax filing fraud. In some embodiments the third party systems 110 may include TSP systems (for example, systems of the US Federal Government, systems of state governments), third party vendor systems, third party data provider systems, and/or other third party systems. The third party systems 110 may be implemented using a variety of devices including, for example, personal computers, servers, tablets, smart phones, smart watches, car consoles, or the like, alone or in combination. The exemplary third party systems 110 include computer hardware and/or software that allows the devices to communicate with the tax alert fraud system 120 as well as one or more of the tax payer/tax filer systems 130 via the communications network 140. The tax fraud alert systems 120 may include a portal or other software or code that allows the TSP systems 110 to provide configurations for how the respective TSP system 110 would like to configure its alerts. The tax alert fraud systems 120 may be partitioned such that one TSP system 110 and its private configurations are not accessible to or viewable by another TSP system 110.


The security and identity verification system 100 may include multiple tax payer/tax filer systems 130 which are utilized by tax filers to, among other things, provide tax submissions, receive tax alerts, and/or review refund status. The tax payer/tax filer systems 130 may be implemented using a variety of devices including, for example, personal computers, servers, tablets, smart phones, smart watches, car consoles, or the like, alone or in combination. The exemplary tax payer/tax filer systems 130 include computer hardware and/or software that allows the devices to communicate with the tax alert fraud system 120 as well as one or more of the third party systems 110, such as a tax service provider via the communications networks 140. To simplify discussion, but without limiting the present disclosure, FIG. 1 is described herein and illustrates only one tax payer/tax filer systems 130.


In some embodiments, the communications network 140 comprises one or more of local area network (LAN), wide area network (WAN), and/or the Internet, for example, via a wired, wireless, or combination of wired and wireless communication links. The communications network 140 may communicate with various computing devices and/or other electronic devices via wired or wireless communication links. The communications network 140 may be used to share resources and may be used for the analog and/or digital transfer of data and information. In some embodiments, the communications network 140 can be used to enable multiple devices access to a single system, enable file sharing across the communications network 140, share software programs on remote systems, or make information easier to access and maintain among network users.


It is recognized that the term “remote” may include data, objects, devices, components, and/or modules not stored locally, that are not accessible via the local bus. Thus, remote devices may include a device which is physically stored in the same room and connected to the user's device via a network. In other situations, a remote device may be located in a separate geographic area, such as, for example, in a different location, country, and so forth.


B. Tax Fraud Alert System



FIG. 1B illustrates an example embodiment of a tax fraud alert system 120. The tax fraud alert system 120 comprises a system that provides alerts to tax filers upon a successful filing of a tax form with a TSP. The tax fraud alert system 120 can also provide remediation services in coordination with TSPs in the event a fraudulent form is filed; and/or validate tax identity information and the corresponding good or best tax filer contact information in order to notify the tax filer in a timely manner. This can be a multi-tenant system in which multiple TSPs are supported by the data submission process each with their own defined configuration of the type of Tax ID information (SSN, name, address, and so on) that is submitted to the tax fraud alert system 120. Each TSP may utilize one or more of the batch connectors or API connectors available in the tax fraud alert system 120 to submit data to the tax fraud alert system 120.


In some embodiments, the tax fraud alert system 120 can include three sub-systems in FIG. 1B: (1) Identity Verification Engine (IVE) 122, (2) Best Contact Engine (BCE) 124, and (3) Alert Notification Engine (ANE) 126, with each engine having its own configuration database to support per tenant business rules. In some embodiments, the IVE 122 and BCE 124 may be optional per tenant, and the data submitted is allowed to bypass these engines and go straight to the ANE 126 to notify tax filers. The IVE 122 can include a configurable rules engine to review incoming data submission to validate and select the best or close matches to the true identity using the combination of data attributes (for example, social security number, name, and address) with known proprietary and public datasets. The BCE 124 can also include a configurable rules engine that reviews incoming data attributes along with data attributes from proprietary and public records to determine at least one valid communication channel (for example, as many valid communication channels as possible, one communication channel, X communication channels) that can be linked to the legitimate tax filer.


In some embodiments, the output of the tax fraud alert system 120 can include one or more of the following options. The first option may include a tax alert to each tax filer based on the results of the IVE 122 and/or the BCE 124. The second option may include a tax alert to identity submitted in the original tax form if the optional IVE 122 and BCE 124 processes were not chosen or if the IVE 122 and/or the BCE 124 were unable to verify a different identity or different contact information than what was submitted in the tax form. This option can still be useful to stop cases where the thief uses the correct information of the tax filer and only changes the account information to be used for tax refunds. The TSP may also use this option to test the notification process and the remediation process for users that receive the notifications. The third option may include a tax fraud alert to the associated TSP with all records that have been flagged by the IVE 122 and the BCE 124. This option can be used by the TSP to initiate fraud investigations on flagged records.


Upon receipt of the tax alert via SMS, email, and/or direct mail, in some embodiments the tax filer may be given detailed instructions on whom to contact to remediate the issue in the event the tax filers believe a tax form was fraudulently filed in the tax filer's name or the name of the tax filer's business. In some embodiments, the tax filer may be automatically redirected to a remediation server which can provide automated remediation processes to assist the tax filer. During this remediation process, in some embodiments, a tax fraud alert can be sent to the associated TSP to halt any tax refund in process and to initiate a fraud review of the tax form, such as via a warm transfer or other transfer or data.


In some embodiments, the tax alert comprises one or more encrypted data packets which stores information about the tax alert and is configured to be sent over an electronic communications network, such as the Internet.


C. Tax Fraud Alert System Processes



FIGS. 1C-1, 1C-2, 1D, and 1E illustrate example processes that can be implemented by embodiments of one or more components of the tax fraud alert system 120.


For example, in FIGS. 1C-1 and 1C-2, a TSP system 110 (for example, a government entity server) can submit user's PII to a security platform or backend system (which may implement the tax fraud alert system 120 shown in FIG. 1B). The backend system can process the PII to identify a correct tax payer and send an alert to the tax payer. The backend system can also include a remediation center such as, for example, a call center or a web portal which can receive reports from tax filers regarding possible fraud or receive confirmations of tax filings from the tax filers who received an alert from that tax fraud alert system 120 as shown in FIG. 1C-1.


In some embodiments, the security platform or backend system (for example a tax notification system) can send the taxpayer other notices throughout the tax processing life cycle if a TSP selects this notification option. For example, as illustrated in FIG. 1C-2, the notices may be available for when tax is filed, and then later, when the tax processing is completed. The notices can also include the results from various stages of the tax processing life cycle. For example, results could be success or additional info needed, or an audit notice, or expect a refund in N days, or a tax refund was sent, and so forth.


1. Tax Alert Processes—First Example


FIG. 1C-1 illustrates embodiments of a tax alert process. In the illustrated embodiments, starting at (1) the tax payer (whether a user or business representative) or tax preparer files a tax form with a TSP system 110 which may include tax ID (such as, for example, social security number (SSN), individual tax payer identification number (ITIN), US government issued identifier (EIN), or other identifier), name or business name, address, phone number, and so forth. The TSP system 110 may then being processing the tax form. If there is an indication that the TSP system 110 should send a notice or alert about the tax filing to indicate that a tax filing has been submitted, then the TSP system 110 may make a call to the tax fraud alert system 120, such as, for example via an application programming interface (API) or by adding the tax payer's record to a batch file for processing. The communication may be made via a secure communication protocol, such as, for example, hypertext transfer protocol secure (HTTPS), secure file transfer protocol (SFTP), or another secure protocol. The indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification.


The tax fraud alert system 120 may receive the tax filing data via the API or the batch process. If the TSP has requested notification of such errors, the tax fraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the tax fraud alert system 120 may perform a verification process, such as, for example, the identity verification process described in FIG. 2A. The tax fraud alert system 120 may also perform a contact process, such as, for example, the best contact process described in FIG. 2B. If the tax payer is not matched, the tax fraud alert system 120 may determine whether to send a fail request receipt. If the tax payer is matches, then the tax fraud alert system 120 may generate and send a notification or alert to the tax payer using one or more of the contact channels determined by the contact process, for example using the alert notification process described in FIG. 2C. The tax payer may inquire about the notice and/or confirm whether the tax filing was correct or indicate possible fraud. The tax fraud alert system 120 may include a call center system or web portal to handle the tax payer inquiries and/or provide the tax payer access to a remote call center system or web portal which handles such inquiries.


The tax fraud alert system 120 and/or the remote call center system or portal, may generate and send an electronic notification indicating whether there is possible fraud associated with the tax payer's corresponding filing. If so, then the tax fraud alert system 120 may generate and send a notification to the TSP system 110 that the tax payer has confirmed the filing. If not, then the tax fraud alert system 120 may generate and send a notification to the TSP system 110 a possible fraud notice. In some embodiments, such notice may include instructions or an indication that is used by the TSP to stop or cancel a refund request. Such notifications may be sent to the TSP system 110 via a secure protocol, such as, for example, HTTPS, SFTP, or another secure protocol.


The TSP system 110 receives the notification and determine whether there is possible fraud using the notification. If so, the TSP system 110 may generate instruction to stop or cancel any refund processing and/or to initiate an investigation of the potential fraud. If not, then the TSP system 110 may resume with its normal tax processing. The TSP system may determine whether there is possible fraud based solely on the notification, based in part on the notification, and/or based on its own independent analysis of the tax payer filing. If the investigation determines that there is no fraud, then the TSP system 110 may resume with its normal tax processing.


2. Tax Alert Processes—Second Example


FIG. 1C-2 illustrates embodiments of a tax alert process. In the illustrated embodiments, starting at (1) the tax payer (whether a user or business representative) or tax preparer files a tax form with a TSP system 110 which may include tax ID (such as, for example, social security number (SSN), individual tax payer identification number (ITIN), US government issued identifier (EIN), or other identifier), name or business name, address, phone number, and so forth. The TSP system 110 may then being processing the tax form. If there is an indication that the TSP system 110 should send a notice or alert about the tax filing to indicate that a tax filing has been submitted, then the TSP system 110 may make a call to the tax fraud alert system 120, such as, for example via an application programming interface (API) or by adding the tax payer's record to a batch file for processing. The communication may be made via a secure communication protocol, such as, for example, hypertext transfer protocol secure (HTTPS), secure file transfer protocol (SFTP), or another secure protocol. The indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification.


The tax fraud alert system 120 may receive the tax filing data via the API or the batch process. If the TSP has requested notification of such errors, the tax fraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the tax fraud alert system 120 may perform a verification process, such as, for example, the identity verification process described in FIG. 2A. The tax fraud alert system 120 may also perform a contact process, such as, for example, the best contact process described in FIG. 2B. If the tax payer is not matched, the tax fraud alert system 120 may determine whether to send a fail request receipt. If the tax payer is matches, then the tax fraud alert system 120 may generate and send a notification or alert to the tax payer using one or more of the contact channels determined by the contact process, for example using the alert notification process described in FIG. 2C. The tax payer may inquire about the notice and/or confirm whether the tax filing was correct or indicate possible fraud. The tax fraud alert system 120 may include a call center system or web portal to handle the tax payer inquiries and/or provide the tax payer access to a remote call center system or web portal which handles such inquiries.


In (2), the TSP system 110 processes the tax form. If there is an indication that the TSP system 110 should send a notice or alert about the tax filing, then the TSP system 110 may make a call to the tax fraud alert system 120, such as, for example via an API or by adding the tax payer's record to a batch file for processing. The communication may be made via a secure communication protocol, such as, for example, HTTPS, SFTP, or another secure protocol. The indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification.


The tax fraud alert system 120 may receive the taxes processed data via the API or the batch process. If the TSP has requested notification of such errors, the tax fraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the tax fraud alert system 120 may generate and send a notification or alert to the tax payer that the taxes have been processed, such as, for example, using one or more of the contact channels determined by the contact process, for example using the alert notification process described in FIG. 2C. The tax payer may inquire about the notice and/or confirm whether the tax filing was correct or indicate possible fraud. The tax fraud alert system 120 may include a call center system or web portal to handle the tax payer inquiries and/or provide the tax payer access to a remote call center system or web portal which handles such inquiries.


If there is a pending refund, then in (3), the TSP processes the refund. If there is an indication that the TSP system 110 should send a notice or alert about the refund, then the TSP system 110 may make a call to the tax fraud alert system 120, such as, for example via an API or by adding the tax payer's record to a batch file for processing. The communication may be made via a secure communication protocol, such as, for example, HTTPS, SFTP, or another secure protocol. The indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification.


The tax fraud alert system 120 may receive the refund data via the API or the batch process. If the TSP has requested notification of such errors, the tax fraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the tax fraud alert system 120 may generate and send a notification or alert to the tax payer that the refund has been sent, such as, for example, using one or more of the contact channels determined by the contact process, for example using the alert notification process described in FIG. 2C. The tax payer may inquire about the notice and/or confirm whether the tax filing was correct or indicate possible fraud. The tax fraud alert system 120 may include a call center system or web portal to handle the tax payer inquiries and/or provide the tax payer access to a remote call center system or web portal which handles such inquiries.


3. Tax Alert Processes—Third Example

As another example, in FIG. 1D, a user can submit a tax form with PII (for example, name, address, phone number, bank account information, and/or social security number) to one or more TSP systems 110 (Block 1). The TSP system 110 can run a tax fraud alert system 120 appliance/API (provided by the tax fraud alert system 120) to depersonalize the data (Block 2) and then securely send the data to the tax fraud alert system 120 (Block 3), such as, for example, by encrypting fields of tax records to depersonalize the data and then write it to a batch file that is sent to the tax fraud alert system 120 on a periodic basis (for example, real time, hourly, daily, and so forth). As one example, “Michael Jones, 123 main st., 123-45-6789” may transform to TSP ID “A12BCD6748HU23J”. The tax fraud alert system 120 may then use the same appliance/API to add the TSP ID to the relevant backend data sets and also send the TSP batch file to the component in the system to perform the various analytics and checks (Block 4) (for example, to the back-end system components, the identity verification engine 122 and best contact engine 124). The system components conduct the analytics and checks and return a response file back to the consumer-facing components of the tax fraud alert system 120 with notification information and the results of the fraud checks such as, for example, whether checks on name, address, email, phone number, SSN, and/or bank account passed or failed (Block 5). The consumer-facing components of the tax fraud alert system 120 then notify the tax payer or customer of the tax submission and provide a portal to track flagged fraud cases and a portal to remediate the issue, such as via an online portal or a call center (Block 6). The user may be notified via one or more channels, such as, for example, email, SMS messaging, and/or direct mail. The consumer-facing components of the tax fraud alert system 120 may also notify the TSP of the potential fraud risk so that the TSP can place a hold on or cancel the tax return and/or refund (Block 7a). The user may contact the remediation center to obtain help with the remediation process prior to TSP processing the tax return and sending out a refund (Block 7b).


4. Tax Alert Processes—Fourth Example

As another example, in FIG. 1E, a tax filer can submit a tax form with PII to one or more TSP systems 110 (Block 1). The TSP system 110 can use an API or batch interface to communicate with a fraud alert system (such as for example, the tax fraud alert system 120 shown in FIG. 1B) to securely transport tax filer's records (Block 2) such as by encrypting the PII and sending the encrypted data to the tax fraud alert system 120 (for example the front-end system accessible via an interface). The tax fraud alert system 120 can then send the data to determine the fraud risk (Block 3), for example, by sending the PII to the back-end system of the identity verification engine 122 and best contact engine 124). An alert may then be provided (Block 4), for example to the alert notification system with notification information and results of the fraud checks, such as, for example, whether checks on name, address, email, phone number, SSN, and/or bank account passed or failed. A person associated with the PII (who may or may not be the same one as the tax filer) may be notified regarding the tax filing such as via email, SMS messaging, and/or direct mail (Block 5a). In addition, the TSP may also be notified of the potential fraud risk so that the TSP can decide whether to place a hold on or cancel the tax return (Block 5b). The tax filer can then contact an entity to assist with the remediation process (Block 6), such as, for example, before the TSP processes the tax return or sends out a tax refund.


The fraud alert system, upon receiving tax filer's records, can analyze the data in the tax filer's records and send results to an alert notification engine. The alert notification engine can notify the tax filer (or another entity if the tax filer is using the other entity's identity) of the tax submission and/or notify the TSP system 110 of the potential fraud risk. The notification to the tax filer can indicate that a tax form has been filed using the entity's tax ID.


It is recognized that FIGS. 1C-1, 1C-2, 1D, and 1E represent embodiments of example systems and processes and that other systems or processes may be used. In some embodiments, the processes are performed by the tax fraud alert system 120 and/or by one of its components, such as a processor or a controls system. However, it is recognized that other components of the tax fraud alert system 120 or other components (not shown) may perform one or more of the processes. For ease of explanation, the following describes the services as performed by the tax fraud alert system 120 or one or more of its components. The example scenarios are intended to illustrate, but not to limit, various aspects of the tax fraud alert system 120. In some embodiments, the processes can vary from the exemplary flowcharts, with some blocks omitted and others added. It is also recognized that one or more blocks in the flowcharts may be optional. The tax fraud alert system 120 may be configured to perform only a subset of the blocks in the flowcharts.


D. Tax Fraud Alert System Components


The illustrated embodiments of FIG. 1B includes a tax fraud alert system 120 which includes an identity verification engine 122, a best contact engine, 124, and an alert notification engine 126. The exemplary tax fraud alert system 120 includes a set of backend servers 128, including an FTP/Batch server 128a configured to process File Transfer Protocol or other batch requests, an API server 128b configured to provide an API portal for other systems to access the tax fraud alert system 120 and/or to make calls to third party APIs, as well as a notification server 128c configured to send and receive electronic notifications.


1. Identity Verification Engine (IVE)



FIG. 2A illustrates example embodiments of an identity verification engine (IVE) 122. The IVE or service 122 may use proprietary data from one or more credit bureaus 123 and other relevant data sources to find the best or a close match to the filer identity elements provided in accordance with the preferences agreed to with the TSP. If the tax filing or tax ID is for a business, the IVE rules and supporting data sources may support identifying the business representatives that should be notified of the tax filing.


In the illustrated embodiments of FIG. 2A, the IVE 122 receive inputs including rules, TSP preferences and taxpayer's tax ID and PII from the TSP. The IVE 122 may then access data to select which data to use for the identity verification based on the received inputs. The data may include data from third party data aggregators such as public record databases, fraud data, credit bureaus, and/or directories, data from proprietary databases such as credit data, non-credit data, business data, consumer data, fraud data, subprime lending data, and/or compiled data. The data is then used to verify the identity(ies) and provide notification of whether such identity(ies) were verified.


In some embodiments, some example features of the IVE 122 can include one or more of the following:

    • The IVE 122 can allow the TSP systems 110 to exchange information with this service via batch files or web service APIs.
    • The tax filer information can be processed through various software services which include information from credit report tradelines known to one or more credit bureaus as well as data on users that do not have a traditional credit history or an extensive credit history, for example subprime credit data. Some example software services for processing filer information can include a consumer data request fulfillment system (such as for example, the one described on U.S. Pat. No. 9,697,263, the disclosure of which is hereby incorporated by reference herein in its entirety for all purposes) and identity authentication services which can include a risk-based fraud detection and prevention platform which can incorporate analytics, knowledge-based authentication and flexible decision-making strategies for more accurate authentications of identities.
    • The matching rules in the IVE 122 can be configurable based on the preferences agreed to with the TSP. An example of the configurable matching rules is provided in the section below.
    • The best identity matches can be selected by the IVE 122 and provided to the Best Contact Engine (BCE) 124.
    • The BCE 124 verifies or identifies the contact information for the selected one or more identities and passes the one or more identities and aggregated contact information to the Alerts Notification Engine (ANE) 126.
    • The IVE 122 may also support fraud checks while verify the identity information received from the TSP system. Some example fraud checks can include: SSN check, multiple submissions to the same address (velocity of the same address being used, which may include physical address or IP address), multiple submissions to the same bank account, verify against deceased records, communication checks (email, phone numbers, residential address), or checking NPPI data in the tax filing against the credit bureau data to look for discrepancies and to verify communication channels. Taxpayers that have raised flags for any of the supported fraud checks can be flagged and reported back to the TSP.


Different or additional sources may also be used for this service depending on the inputs provided by the TSP and the TSP preferences for how to handle identify verification.


Special Handling Matching Rules for Identity Verification Engine


In some embodiments, the IVE 122 can include configurable rules. Some example scenarios and configurations are described in the table below.














Scenario
Description
Options







No Match
No Contact Found with PII
Send tax alert notice to input


(Unverified
given.
address provided by TSP


Input)

system, if any




Do not send notice




If using batch communication




with TSP system, add record to




failure list




If using web service




communication with TSP




system, return error code for this




scenario


Contact Info
Contact info in filing differs from
Send tax alert notice to both the


Mismatch
contact information (such as for
filing contact and the contact


(Partially
example the best contact
found by service


Unverified Input)
information) found by service
Send tax alert notice only to the




best contact found by service




Do not send notice




If using batch communication




with TSP system, add record to




failure list




If using web service




communication with TSP




system, return error code for this




scenario


Name Mismatch
TSP submitted name on filing
Send notice and address the tax


(Partially
and it differs from name this
alert notice to


Unverified Input)
service found for the Tax ID
a. the last name submitted on



given
filing, or




b. last name found by the




service, or




c. both of the above, or




d. none of the above




Use a generic term such as tax




filer




Do not send notice




If using batch communication




with TSP system, add record to




failure list




If using web service




communication with TSP




system, return error code for this




scenario


No Filing Name
TSP chooses to submit the Tax
Send notice and


Given (Partially
ID and omit the name
a. Address the tax alert to the


Unverified Input)

name found by the service, if




any, or




b. Do not address the alert to




anyone,




c. Use a generic term chosen




by TSP, such as “tax filer”


Multiple Filings
Tax ID has been seen before by
Notice can be sent for a contact



the service. Same person may
(or the best contact) found for



have multiple filings for personal
the tax ID submitted each time a



and business(es)
record of filing is sent by the




TSP.


Prison contact
A contact or the best contact
Send alert as with any other



found is a prison or halfway
address



house
Do not send alert


Tax ID flagged as
The tax ID given is flagged as
Send alert anyway following


Deceased
deceased in the relevant Death
usual rules



Master Files
Do not send notice




If using batch communication




with TSP system, add record to




failure list




If using web service




communication with TSP




system, return error code for this




scenario


Tax ID flagged as
The tax ID is not listed as issued
Send alert anyway following


Not Yet Issued
by the appropriate authority
usual rules




Do not send notice




If using batch communication




with TSP system, add record to




failure list




If using web service




communication with TSP




system, return error code for this




scenario


Tax ID Issue Date
The tax ID was issued on a date
Send alert anyway following


Discrepancy
prior to the date of birth of the
usual rules



tax filer, if given or the tax ID
Do not send notice



was issued too recently. How
If using batch communication



recent is configured by the TSP.
with TSP system, add record to




failure list




If using web service




communication with TSP




system, return error code for this




scenario









2. Best Contact Engine (BCE)



FIG. 2B illustrates example embodiments of a contact engine or best contact engine (BCE) 124. The BCE or service 124 can use proprietary data from one or more credit bureaus and other relevant data sources to find contact information 125 (for example, a matched contact information or the best contact information) for the tax alerts and notify the tax filers in accordance with the preferences agreed to with the TSP.


In the illustrated embodiments of FIG. 2B, the BCE 124 receives input such as rules, TSP preferences, and identity(ies) from the IVE 122. The BCE 124 may then review data to provide contact details. The data may include data from third party data aggregators such as phone or mobile data aggregators, directories, and/or skip trace databases, as well as data from proprietary database such as consumer data, business data, change of address data, and/or marketing data. The BDE 124 then generates an electronic indication of contact details.


The types of information and software services that can be executed together with the BCE 124 for locating the contact information can include one or more of the following:

    • Credit tradelines data, such as credit header data or tax filers' contact information.
    • Sub-prime loan data which adds coverage for parts of the population that use less traditional lending outlets.
    • Marketing tracking data, such as data which link fragmented and incomplete data including email, social and personally identifiable information (PII), across channels and devices. Examples of such marketing tracking data are also described in U.S. Pat. No. 9,767,309, the disclosure of which is hereby incorporated by reference herein in its entirety for all purposes.
    • Identity authentication services which can include a risk-based fraud detection and prevention platform which can incorporates analytics, knowledge-based authentication and flexible decision-making strategies for more accurate authentications of identities.
    • National change of address services, such as for example monitoring services for change of address.
    • Phone directory services including Mobile Network Operators (MNOs).


Different or additional sources may also be used for this service depending on the inputs provided by the TSP and the TSP preferences for how to handle matching ambiguities.


3. Alert Notification Engine (ANE)



FIG. 2C illustrates example embodiments of an alert notification engine (ANE) 126. After locating the contact information for each verified tax filer, in some embodiments, the ANE or service 126 can follow the rules agreed to with the TSP 127 regarding who to contact and how to handle identity matching ambiguities or discrepancies. The notification processes for this service can manage distribution channel and distribution schedule.


In the illustrated embodiments of FIG. 2C, the ANE 126 receives the contact data from the BCE 124 and then generates alert packages to be sent to recipients based on the TSP configured distribution channels. The alert data may be sent to a web service API or to a batch file to allow the tax filer or product/service subscriber to access the alert information. The tax filer may have to provide certain information to access the alert, such as a logon, a filing data, a filer ID, a refund amount, and so forth. The alert data may also, or instead, be provided to a configured template which will be loaded and sent to a desired channel such as email, direct mail, SMS messaging, and/or a phone call.


In some embodiments, distribution channels provide TSP several options for sending the alert to the tax filer. Some example distribution channels include:

    • The TSP can choose to use the alert notification engine to deliver the alerts. If this channel is chosen, the TSP can configure the notifications (templates), with the styling and copy they choose. The TSP can also select how the notifications are sent. Notification types include: direct mail, email, SMS text, social media messages, and/or phone voice messages. The TSP may choose one or more of these communication channels or decide to waterfall notifications to these channels: for example, starting with SMS text, and only using email and/or direct mail if the SMS text to the identified phone number fails or a mobile phone is not located for the identity.
    • The TSPs can choose to send the alerts from their system. If this channel is chosen, the tax fraud alert system 120 can pass the identity, contacts, and alert information to the TSP via a web service API or a batch file process. The TSP would then be responsible for sending the notice via notification channels (phone, mail, email, and so forth).
    • The TSP can also choose to allow the alerts to be sent to subscribers of market facing identity monitoring products. If chosen, the tax fraud alert system 120 can pass the alert information to the a 3rd party entity via web service APIs to provide as a tax filing alert within the subscriber's product.


In some embodiments, distribution schedule may be appropriate to handle large volumes. For example, the alert notification engine can avoid sending a volume of notifications at once that would result in an inquiry volume that could not be supported by the call centers.


In some embodiments, the notification may follow one or more templates which may be approved by TSPs. Selection of appropriate templates depending on TSP preferences, notification channel (for example, the template for text messages would be different than the template for emails), and PII available for a tax filer. Parameter substitution for notification templates including ways for tax payers or tax filers to authenticate that the tax alert notice is legitimate. Some examples of how to show legitimacy of the alert include one or more of:

    • Official Tax Service Provider letterhead for direct mail.
    • Official TSP logos in email.
    • Official TSP phone greetings or voice talent.
    • Partial Tax ID, if approved by TSP. This could be made available only by call center agents or web service portal if TSP deems too sensitive to send in tax alert.
    • Tax Filing Date.
    • Name on filing if it matches name service found. Including name on filing is problematic if there is a conflict between filing and what service found.
    • Partial email address given at time of filing. This might be problematic in cases of fraud.
    • Tax filing details such as dollar amounts if Tax Service Provider is willing to submit those with each record.
    • Notices can include safeguards to make it difficult for fraudsters to replicate the alerts to launch phishing attacks. For example, if the TSP chooses, any emails sent could exclude direct links.
    • Marketing campaigns can educate the tax payers or tax filers on ways to confirm the tax alert is legitimate, for example promoting that official emails from the TSP may not include direct links.


In some embodiments, each tax alert sent can include a unique identifier that can be used by the user when contacting the branded call center, reaching the branded web portal to handle tax alert inquiries, and/or when calling the TSP directly to inquire about the alert or to dispute the tax filing.


4. Alert Notification Support and Remediation via Portal and Call Center


As part of this solution, in some embodiments, the tax fraud alert system 120 can offer TSPs multiple options to support the tax filers that receive the tax alert notification. The alert itself can include the appropriate calls to action for the filer in accordance with the option(s) the TSP selected for offering alert notification support. Some examples of alert notification support can include one or more of:

    • Refer filers to a call center hosted by the TSP. This option is supported by providing the TSP with information about the tax alert notifications sent including the ways the filer was contacted, when, and, if necessary, the actual contact details used for the notification(s).
    • Refer filers to a web portal hosted by the TSP. This option is supported by providing the TSP information about the tax alert notifications sent including the ways the filer was contacted, when, and, if necessary, the actual contact details used for the notification(s).
    • A hosted call center. The call center can be hosted by an entity running the tax fraud alert system 120. The call center can include training to assist filers that receive a tax alert notification or have general questions about it. The scope of what call center staff can handle or escalate to the TSP depends on TSP configuration options.
    • A hosted web portal. The web portal can be hosted by an entity running the tax fraud alert system 120 and be tailored to assist filers that receive a tax alert notification or have general questions about it. The functionality available in the portal depends on TSP configuration options.
    • In certain embodiments, the TSP may choose to host the web portal or the call center, alone or in combination.


In some embodiments, the TSP can also choose which functions may be offered by the call center or the web portal as applicable if TSP chooses to have another entity to host the call center or the web portal. Some example functions can include one or more of:

    • General information and questions and answers about the tax fraud alert system 120. Content and any call center scripts can be configurable and approved by the TSP.
    • Authentication of tax filer. TSP can be given options for authenticating the caller including 2 factor authentication, knowledge based authentication, or other proprietary authentication options.
    • Reviewing previously sent tax alerts.
    • Initiating a dispute of a tax filing.
    • Stop payment of a refund


For some options, such as, for example, the last two options (initiating a dispute of a tax filing and stopping payment of a refund), TSP may choose to have the host (of the call center and/or web portal) to either escalate handling of disputes and/or stop payments on refunds, or the TSP may offer a web service that allows the host to initiate a dispute programmatically via either the web portal and/or an administrative tool available to the call center staff.


5. Call Center Support



FIGS. 2D-1 and 2D2 illustrate flow diagrams for embodiments of call center support processes. If the TSP chooses the call center support option, the host of the call center support service can provide call center agents trained to handle inquiries from users that received a tax alert. The agents can be given training and scripts approved by the TSP with detailed instructions on how to address all possible inquiries from the end user and how to escalate issues. The scope of what the call center can handle may depend on the configurable options chosen by the TSP.


In the illustrated embodiments of FIG. 2D-1, a tax filer calls a support line and an agent searches a database with information provided to the tax filer in the alert notification to locate the tax filer. When the alert was sent, the alert may have been electronically attached to the tax filer's profile in a backend database. It is recognized that a variety of PII may be used to identify a tax filer, including, for example, alert ID (for example, a unique identifier generated for an alert), a filer ID (for example, the social security number of entity number of the filer provided by the TSP), and/or a return ID (for example, a unique identifier generated for the tax return submission provided by the TSP). The tax filer may be authenticated, for example, using data from the tax filer's tax return submission. The agent may initiate authentication by accessing an authentication process of a proprietary authentication service. For example, authentication questions may be asked which can be retrieved based on the located user's social security number, address, and so forth. If the tax filer passes the authentication, the agent may be directed by the system to answer the tax filer's questions and/or initiate a dispute process. If the tax filer does not pass the authentication, the agent may be presented with instructions to inform the tax payer or customer of the inability to verify the tax filer's information.


In the illustrated embodiments of FIG. 2D-2, the system determines whether the TSP is using a contracted call center or the TSP's call center. If a contracted call center, then a call is received by the contracted call center, the agent searches a backend database by tax return ID to find the tax return submission, the backend authenticates the user using data from the tax return submission and backend database (for example, simple authentication using submission data, or non-credit knowledge based authentication), if the user passes the authentication the agent files a ticket in the call center system and includes call disposition data (for example general questions and answer, fraud event information), the reporting collects the call center tickets on a regular basis (for example, in real time, hourly, daily, and so forth) and send them to the TSP for investigation (for example, via FTP, SFPT, restful reporting service, and so forth). If a TSP call center, the TSP receives the call. The TSP agent searches the TSP database by tax return ID to find the tax return submission, the TSP authenticates the user using data from the tax return submission, if the user passes the authentication, the submission is held by TSP pending TSP's fraud investigation.


In both scenarios, next the TSP may investigate the submission and cancel the fraudulent return or puts the return on hold. The TSP contacts the user and provides them a code to file their real tax return when ready. In some embodiments, this could be a notification from the backend (for example, the tax fraud alert system 120) which may pass the status of the investigation to the backend with a tax submission code. It is recognized that some TSPs may have a process for generating unique IDs for victims of identity theft. This ID may be entered to file a tax return and may be already integrated into the TSP. This could be used when the user is ready to submit their real return.


It is recognized that one or more of the TSPs may use a different process and so the embodiments of FIG. 2D-2 are meant to illustrate example embodiments and not limit the disclosure.


In some embodiments, the host's databases (or other databases) may be used to implement one or more of the following functions related to call center support:

    • When alert is sent, it can be attached to a tax payer or customer profile in the host database. Forms of PII that can be used to identify the tax payer or customer can be:
      • Alert ID: Unique #Generated for the alert;
      • Filer ID: SSN or EIN of the filer provided by the TSP; and/or
      • Tax Form ID: Unique ID generated for the tax form submission provided by the TSP.
    • Authenticate the identity of the user using the PII and any tax filing details provided by the TSP system, plus proprietary methods of authentication.
    • Review the tax alerts sent.
    • Clearly guide the user through next steps if the tax filing is not recognized by the user
    • Ability to view and relay status of previous inquiries started by the end user. This may require that the TSP system 110 provide a way to look up status or a way for the TSP system 110 to push inquiry or dispute status to the service.


6. Web Portal Support



FIG. 2E illustrates a flow diagram for embodiments of a web portal support process. If the TSP chooses the web portal support option, a host of the web portal can provide a web service portal to service users with the look, feel, and content approved by the TSP. The portal can be designed to handle inquiries from users that received a tax alert.


In the illustrated embodiments of FIG. 2E, the backend system receives an indication that a tax filer has logged onto the web portal and retrieves alert information associated with the user. The identity verification process is initiated. For example, in some embodiments, prior to any information being shared, the system may prompt knowledge based authentication questions and/or use proprietary authentication services. The knowledge based authentication questions may be based off of the located user's social security number, entity number, address and so forth. If the user's passes authentication, the alert information and dispute information may be display on a user interface. If the user does not pass authentication, the portal may inform the user of its inability to verify the user.


The portal can have automated ways or static content that address one or more of the following functions:

    • Authenticate the identity of the user using the PII and any tax filing details provided by the TSP, plus proprietary methods of authentication.
    • Present the tax alert(s) details.
    • Clearly guide the user through next steps if the tax filing is not recognized by the user
    • Inform the TSP via an automated or offline process that the user disputes having filed taxes. This process could either suspend delivery of the refund or initiate additional investigation by the TSP.
    • Ability to display status of previous inquiries started by the end user. This requires that the TSP provide a way to look up status or a way for the TSP to push inquiry or dispute status to the service.


It is recognized that white labeling services may be provided allowing one or more tax filer facing systems to be branded with one entity and one or more backend processes or services to be run by an entity other than the entity associated with the branding. In such case, the white labeling services may be hosted by the backend processes and/or a system of the entity associated with the branding.


7. Dispute Process



FIG. 2F illustrates a flow diagram for embodiments of a dispute process. In the illustrated embodiments of FIG. 2F, a tax filer calls or logs onto a portal and is provided alert details. An agent may initiate a dispute and may then transfer the call to the appropriate TSP, submit the dispute via a web service tool which may be integrated with the appropriate TSP, and/or submit the dispute via a batch service tool which may be integrated with the appropriate TSP. The TSP then receives the dispute and may suspend the refund and initiate an investigation. The web service tool and/or batch service tool may be provided by a customer service representative (CSR) system.


The TSP can establish manual or automated processes that allow the tax fraud alert system 120 to perform one or more of the following:

    • Notify the TSP that a user disputes a tax filing and either suspend a refund or initiate additional investigation of the tax filing,
      • For example, this can be achieved by:
        • Warm call transfer to the TSP, or
        • Automated process via web services or batch file.
    • Provide status of an inquiry or dispute previously submitted, including resolution.
      • For example, this can be achieved by:
        • Batch file, or
        • Web services.


          E. Pre-Launch Service Configuration


In some embodiments, the tax fraud alert system 120 also includes one or more components and processes to provide automated configuration services for the other systems, such as the TSP systems, third party vendors, or third party data suppliers. The configuration may be provided via a remotely accessible portal that allows a user of a third party system to access the portal, review the options for configuration, provide electronic indications of the selected options, and instruct the portal to store the options. Prior to launching the tax fraud alert system 120, the TSP can configure one or more of the following options:

    • PII to use: What minimum and optional PII to submit to the service.
    • Handling matching scenarios
      • How to handle ambiguities or discrepancies of identity based on the PII provided. The TSP can have the service configured to only send notices to tax filers that have been verified, for example, the contact information found by the service matches the contact information in the tax filing; and/or to also send tax alerts to the contact information in the tax filing, even if that information is unverified by the service. For example, if TSP only provides a tax ID and the service locates several names tied to that tax ID, the service can be configured to perform one or more of the following actions:
        • Notify one or more or all of the names found or to not send notices; and/or
        • Callback (automatically in batch, web service, or via a call center) to the TSP system 110 to suspend delivery of a refund or initiate further investigation before sending the refund.
      • Or for example, if a TSP system 110 provides the tax ID, name, and address used in the tax form filed and the tax fraud alert system 120 finds a different name and/or address tied to the tax ID, the service can be configured to perform one or more of the following actions:
        • Send notices using the PII used in the tax filing and/or to the PII found by the service; and/or
        • Callback to the TSP system 110 to suspend delivery of a refund or initiate further investigation before sending the refund.
      • Whether to flag cases of tax ID typos—whether to have the service indicate when a tax ID does not match the PII provided, but a transposed digit in the tax ID would resolve the discrepancy. This may be difficult to automate but it is possible to do using credit bureau data or other third party data.
      • Whether to receive error responses for inputs submitted, including bad input data, ambiguous or contradictory results, no matching results.
    • A table enumerating known conditions and options for how to handle each can be presented to the TSP system.
    • Media used for notices: Whether to notify tax filers via direct mail, and/or email, phone, or text message.
    • Who to notify
      • Whether to notify both parties in a joint filing.
      • Whether to make exceptions on whom to send notices to, for instance, do not send notices to prisons or those where the tax ID is listed as deceased or unverified tax filers.
    • When to notify: Whether to notify for one or more of the following events:
      • Main tax form is filed (for example, 1040 or 1040-EZ) or other selected forms.
      • Tax form filed has completed processing or requires more details.
      • Suspended refund or suspended processing (for example, due to suspected fraud).
      • Resolution of a suspended refund or suspended processing.
    • Who to address notices to: Whether to address notices to the name used in the tax filing and/or to the name(s) found by the service.
    • Handling user inquiries
      • Whether to have this solution host a call center and/or a web portal to answer inquiries from users that receive a tax alert.
      • If this service is to host a web portal on behalf of the TSP, whether that portal can offer identity theft services to the user.
      • Whether to receive real-time callbacks when users respond to the call center and/or the web portal provided by the service.
      • Whether to provide an automated web service callback mechanism or other scalable process to suspend delivery of a tax refund or initiate further investigation.
    • Method of data transfer: Whether to exchange information with this service via batch files, web service calls, call centers, and/or offline.


      F. Inputs supported by the Tax Alerts Service


In some embodiments, the TSP may be offered configurable options for what information to share and how to share it. Some features in this solution can only be available if certain optional inputs are provided. For example, the ability to present to the end user dollar amounts specific to their tax filing as a way for the user to gain confidence that the notification is legitimate would only be possible if the TSP is willing to provide such dollar amounts for use in this solution. Omission of optional PII might reduce the efficacy of the service or render some features unavailable.


In some embodiments, the PII submitted can be expected to be what the tax filer provided in the tax form filing and does not necessarily have to be verified by the TSP before submitting the PII to the service. Examples of submitted PII may include one or more of the following:

    • Tax ID*: Tax ID, ITIN, EIN or any tax identifier supported by the local, state, or federal government agency collecting the taxes. It can be used to confirm a match and find the contact information for sending notices. The tax ID may be for an individual or a business entity.
    • Full Name*: First Name, Middle Name, Last Name, Suffix. If given, it can be used to help confirm a match and potentially to address the notices sent depending on TSP preferences.
    • Address*: street1, street2, city, state, postal code or other applicable fields if the address is outside the USA.
    • Date of Birth: If given, it can be used to help confirm a match.
    • Phone: If given, it can be used to help confirm a match and possibly for notification.
    • Email: If given, it can be used to help confirm a match and possibly for notification.
    • Filing status: Any status supported by the local, state, or federal government agency collecting the taxes. For example, married filing jointly. If given, it can be used in the tax alert to give the user more confidence that the notice is legitimate.
    • Joint Filer Tax ID: Tax ID, ITIN, EIN or any tax identifier supported by the local, state, or federal government agency collecting the taxes. It can be used to confirm a match and find the contact information (such as for example, the best contact information) for sending notices. Joint filer information should only be provided if the TSP wants to notify both parties in a joint filing.
    • Joint Filer Full Name: First Name, Middle Name, Last Name, Suffix. If given, it can be used to help confirm a match and potentially to address the notices sent depending on TSP preferences. Joint filer information should only be provided if the TSP wants to notify both parties in a joint filing.
    • Joint Filer Date of Birth: If given, it can be used to help confirm a match. Joint filer information should only be provided if the TSP wants to notify both parties in a joint filing.
    • Joint Filer Phone: If given, it can be used to help confirm a match and possibly for notification
    • Joint Filer Email: If given, it can be used to help confirm a match and possibly for notification. Joint filer information may only be provided if the TSP wants to notify both parties in a joint filing.
    • Tax Filing Date: If given, it can be used in the tax alert to give the user more confidence that the notice is legitimate.
    • Tax Preparer: Name of tax preparer software, company, or person. If given, it can be used in the tax alert to give the user more confidence that the notice is legitimate.
    • Tax Filing Detail1 Label: If given, it can be used in the tax alert to give the user more confidence that the notice is legitimate. For example, “Adjusted Gross Income” submitted in tax filing. It could also be used to authenticate the user if s/he calls or visits the web portal to inquire about the notice.
    • Tax Filing Detail1: If given, it can be used in the tax alert to give the user more confidence that the notice is legitimate. For example, Adjusted Gross Income amount submitted in tax filing. It could also be used to authenticate the user if s/he calls or visits the web portal to inquire about the notice.
    • Tax Filing Detail2 Label: If given, it can be used in the tax alert to give the user more confidence that the notice is legitimate. For example, “Previous Year Refund or Payment”. It could also be used to authenticate the user if the user calls or visits the web portal to inquire about the notice.
    • Tax Filing Detail2: I given, it can be used in the tax alert to give the user more confidence that the notice is legitimate. For example, Previous Year Refund or Payment amount. It could also be used to authenticate the user if he or she calls or visits the web portal to inquire about the notice.


      Where “*” represents either tax ID or Full Name and Address may be required for this service in some embodiments. In some embodiments, there is no requirement for TSP to perform input validation such as ensuring Tax ID is not in death master file or has been issued long enough ago to justify a tax filing.


      G. Example Computing System Implementation and Architecture



FIG. 3 illustrates a general architecture of a computing system for processing implementing various aspects of the present disclosure. Many or all of the components of the computing system shown in FIG. 3 may be included in the various computing devices and systems discussed herein, including the TSP systems, the tax fraud alert system 120, the tax filer system 130, the third party vendor systems, the third party data systems, and so forth. The computing system may include, for example, a personal computer (such as, for example, IBM, Macintosh, Microsoft Windows compatible, OS X compatible, Linux/Unix compatible, or other types of computing systems, alone or in combination), a server, a workstation, a laptop computer, a smart phone, a smart watch, a personal digital assistant, a kiosk, a car console, a tablet, or a media player. In one embodiment, the computing system's processing system 600 includes one or more central processing units (CPU) 612, which may each include a conventional or proprietary microprocessor specially configured to perform, in whole or in part, one or more of the features described above. The processing system 600 further includes one or more memory 618, such as random access memory (RAM) for temporary storage of information, one or more read only memory (ROM) for permanent storage of information, and one or more mass storage device 603, such as a hard drive, diskette, solid state drive, or optical media storage device. A data store 621 may also be included. In some implementations, the data store 621 may be designed to handle large quantities of data and provide fast retrieval of the records. To facilitate efficient storage and retrieval, the data store 621 may be indexed using one or more of compressed data, identifiers, or other data, such as that described above.


Typically, the components of the processing system 600 are connected using a standards-based bus system 624. In different embodiments, the standards-based bus system 624 could be implemented in Peripheral Component Interconnect (PCI), Microchannel, Small Computer System Interface (SCSI), Industrial Standard Architecture (ISA) and Extended ISA (EISA) architectures, for example. In addition, the functionality provided for in the components and modules of processing system 600 may be combined into fewer components and modules or further separated into additional components and modules.


The processing system 600 is generally controlled and coordinated by operating system software, such as Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server, Unix, Linux, SunOS, Solaris, iOS, MAC OS X, Blackberry OS, Android, or other operating systems. In other embodiments, the processing system 600 may be controlled by a proprietary operating system. The operating system is configured to control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface, such as a graphical user interface (GUI), among other things. The GUI may include an application interface and/or a web-based interface including data fields for receiving input signals or providing electronic information and/or for providing information to the user in response to any received input signals. A GUI may be implemented in whole or in part using technologies such as HTML, Flash, Java, .net, web services, and RSS. In some implementations, a GUI may be included in a stand-alone client (for example, thick client, fat client) configured to communicate (for example, send or receive data) in accordance with one or more of the aspects described.


The processing system 600 may include one or more commonly available input/output (I/O) devices and interfaces 615, such as a keyboard, stylus, touch screen, mouse, touchpad, and printer. In one embodiment, the I/O devices and interfaces 615 include one or more display devices, such as a monitor, that allows the visual presentation of data to a user. More particularly, a display device provides for the presentation of GUIs, application software data, and multimedia presentations, for example. The processing system 600 may also include one or more multimedia devices 606, such as speakers, video cards, graphics accelerators, and microphones, for example.


In the embodiment of FIG. 3, the I/O devices and interfaces 615 provide a communication interface to various external devices. The processing system 600 may be electronically coupled to one or more networks, which comprise one or more of a LAN, WAN, cellular network, satellite network, and/or the Internet, for example, via a wired, wireless, or combination of wired and wireless communication link. The networks communicate with various computing devices and/or other electronic devices via wired or wireless communication links. The communication can occur using various protocols such as, for example, the File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), and so on.


In some embodiments, information may be provided to the processing system 600 over a network from one or more data sources. The data sources may include one or more internal and/or external data sources. In some embodiments, one or more of the databases or data sources may be implemented using a relational database, such as Sybase, Oracle, CodeBase and Microsoft® SQL Server as well as other types of databases such as, for example, a flat file database, a non-relational database, an entity-relationship database, and object-oriented database, and/or a record-based database.


In general, the word “module,” as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, Java, Lua, C, or C++. A software module may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts. Software modules configured for execution on computing devices may be provided on a computer readable medium, such as a compact disc, digital video disc, flash drive, or any other tangible medium. Such software code may be stored, partially or fully, on a memory device of the executing computing device, such as the processing system 600, for execution by the computing device. Software instructions may be embedded in firmware, such as an EPROM. It will be further appreciated that hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors. The modules described herein are preferably implemented as software modules. They may be represented in hardware or firmware. Generally, the modules described herein refer to logical modules that may be combined with other modules or divided into sub-modules despite their physical organization or storage.


In the example of FIG. 3, the modules 609 may be configured for execution by the CPU 612 to perform, in whole or in part, any or all of the process discussed above. The processes may also be performed by one or more virtual machines. For example, the processes may be hosted by a cloud computing system. In some embodiments, one or more components of the processing system 600 may be part of the cloud computing system. Additionally or alternatively, the virtualization may be achieved at the operating system level. For example, the one or more processes described herein may be executed using application containerization. The one or more processes may also be implemented on a Lambda architecture designed to handle mass quantities of data by taking advantage of the batch processing and the stream processing.


It is to be understood that not necessarily all objects or advantages may be achieved in accordance with any particular embodiment described herein. Thus, for example, those skilled in the art will recognize that certain embodiments may be configured to operate in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other objects or advantages as may be taught or suggested herein.


All of the processes described herein may be embodied in, and fully automated, via software code modules executed by a computing system that includes one or more computers or processors. In some embodiments, at least some of the processes may be implemented using virtualization techniques such as, for example, cloud computing, application containerization, or Lambda architecture, so on, alone or in combination. The code modules may be stored in any type of non-transitory computer-readable medium or other computer storage device. Some or all the methods may be embodied in specialized computer hardware.


Many other variations than those described herein will be apparent from this disclosure. For example, depending on the embodiment, certain acts, events, or functions of any of the algorithms described herein can be performed in a different sequence or can be added, merged, or left out altogether (for example, not all described acts or events are necessary for the practice of the algorithms). Moreover, in certain embodiments, acts or events can be performed concurrently, for example, through multi-threaded processing, interrupt processing, or multiple processors or processor cores or on other parallel architectures, rather than sequentially. In addition, different tasks or processes can be performed by different machines and/or computing systems that can function together.


The various illustrative logical blocks and modules described in connection with the embodiments disclosed herein can be implemented or performed by a machine, such as a virtual machine, a processing unit or processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A processor can be a microprocessor, but in the alternative, the processor can be a controller, microcontroller, or state machine, combinations of the same, or the like. A processor can include electrical circuitry configured to process computer-executable instructions. In another embodiment, a processor includes an FPGA or other programmable device that performs logic operations without processing computer-executable instructions. A processor can also be implemented as a combination of computing devices, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Although described herein primarily with respect to digital technology, a processor may also include primarily analog components. For example, some or all of the signal processing algorithms described herein may be implemented in analog circuitry or mixed analog and digital circuitry. A computing environment can include any type of computer system, including, but not limited to, a computer system based on a microprocessor, a mainframe computer, a digital signal processor, a portable computing device, a device controller, or a computational engine within an appliance, to name a few.


Conditional language such as, among others, “can,” “could,” “might” or “may,” unless specifically stated otherwise, are understood within the context as used in general to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.


Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is understood with the context as used in general to present that an item, term, etc., may be either X, Y, or Z, or any combination thereof (for example, X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.


Any process descriptions, elements or blocks in the flow diagrams described herein and/or depicted in the attached figures should be understood as potentially representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or elements in the process. Alternate implementations are included within the scope of the embodiments described herein in which elements or functions may be deleted, executed out of order from that shown, or discussed, including substantially concurrently or in reverse order, depending on the functionality involved as would be understood by those skilled in the art.


Unless otherwise explicitly stated, articles such as “a” or “an” should generally be interpreted to include one or more described items. Accordingly, phrases such as “a device configured to” are intended to include one or more recited devices. Such one or more recited devices can also be collectively configured to carry out the stated recitations. For example, “a processor configured to carry out recitations A, B and C” can include a first processor configured to carry out recitation A working in conjunction with a second processor configured to carry out recitations B and C.


It should be emphasized that many variations and modifications may be made to the above-described embodiments, the elements of which are to be understood as being among other acceptable examples. All such modifications and variations are intended to be included herein within the scope of this disclosure.

Claims
  • 1. A fraud detection and alert system comprising: one or more data stores configured to store: computer-executable instructions,user data associated with a plurality of users that is received from a tax authority, wherein the user data includes first user data associated with a first user, andverification data associated with one or more of the plurality of users based at least in part on proprietary and public datasets, wherein at least a portion of the verification data is different from the user data received from the tax authority, and wherein the verification data includes first verification data associated with the first user;a network interface configured to communicate with a plurality of network service devices; andone or more physical computer processors in communication with the one or more data stores, wherein the computer-executable instructions, when executed, configure the one or more processors to: receive and store, from a tax authority via the network interface, an electronic batch file that includes a plurality of electronic requests, wherein each electronic request of the plurality of electronic requests is for a filing of an application, wherein a first electronic request of the plurality of electronic requests is associated with a first user, a first application, and includes the first user data, wherein the first user data includes an alphanumeric identifier that is generated based at least in part on encrypted personally identifying information (PII) associated with the first user;based at least in part on the first electronic request and a configurable rules engine, determine a matching user to the identity of the first user by comparing at least a portion of the first user data to the first verification data;based at least in part on the determination of the matching user, transmit, to a user device via the network interface, a notification associated with the matching user regarding the first application;receive, from the user device via the network interface, a potential fraud indication indicating that the first application or the first electronic request is possibly fraudulent;determine, based at least in part on the potential fraud indication, that the first application or the first electronic request is fraudulent; andgenerate and transmit, to the tax authority via the network interface, electronic instructions to stop processing the first application as requested by the first electronic request.
  • 2. The fraud detection and alert system of claim 1, wherein the first user data further includes personally identifying information (PII) associated with the first user.
  • 3. The fraud detection and alert system of claim 1, wherein the notification to the user device regarding a successful application filing of the first application is transmitted to a type of contact included in the verification data.
  • 4. The fraud detection and alert system of claim 1, wherein the one or more physical processors are further configured by machine readable instructions to: transmit, to an external third party entity via the network interface, the electronic instructions to stop the processing of the first application.
  • 5. A computerized method for detecting fraudulent tax filings, the computerized method comprising: receiving and storing, from a tax authority via the network interface, an electronic batch file that includes a plurality of electronic requests, wherein each electronic request of the plurality of electronic requests is for a filing of an application, wherein a first electronic request of the plurality of electronic requests is associated with a first user, a first application, and includes first user data associated with the first user, wherein the first user data includes an alphanumeric identifier that is generated based at least in part on encrypted personally identifying information (PII) associated with the first user;based at least in part on the first electronic request and a configurable rules engine and using one or more computer processors, determine a matching user to the identity of the first user by comparing at least a portion of the first user data to first verification data associated with the first user and based at least in part on proprietary and public datasets, wherein at least a portion of the first verification data is different from the first user data received from the tax authority;based at least in part on the determination of a matching user, transmitting, to a user device via the network interface and one or more computer processors, a notification associated with the matching user regarding the first application;receiving, from the user device via a network interface, a potential fraud indication indicating that the first application or the first electronic request is possibly fraudulent;determining, via one or more computer processors, based at least in part on the potential fraud indication, that the first application or the first electronic request is fraudulent; andgenerating and transmitting, to the tax authority via the network interface and the one or more computer processors, electronic instructions to stop processing the first application as requested by the first electronic request.
  • 6. The computerized method of claim 5, wherein the first user data further includes personally identifying information (PII) associated with the first user.
  • 7. The computerized method of claim 5, wherein the notification to the user device regarding a successful application filing of the first application is transmitted to a type of contact included in the verification data.
  • 8. The computerized method of claim 5, further comprising: transmitting, to an external third party entity, the electronic instructions to stop the processing of the first application.
  • 9. A non-transitory storage medium for storing instructions adapted to be executed by a processor to perform a method for automatically detecting fraudulent tax filings, the instructions comprising: receiving and storing, from a tax authority, an electronic batch file that includes a plurality of electronic requests, wherein each electronic request of the plurality of electronic requests is for a filing of an application, and wherein a first electronic request of the plurality of electronic requests is associated with a first user, a first application, and includes the first user data associated with the first user, wherein the first user data includes an alphanumeric identifier that is generated based at least in part on encrypted personally identifying information (PII) associated with the first user;based at least in part on the first electronic request and a configurable rules engine, determine a matching user to the identity of the first user by comparing at least a portion of the first user data to the first verification data associated with the first user and based at least in part on proprietary and public datasets, wherein at least a portion of the first verification data is different from the first user data received from the tax authority;based at least in part on the determination of a matching user, transmitting, to a user device, a notification associated with the matching user regarding the first application;receiving, from the user device, a potential fraud indication indicating that the first application or the first electronic request is possibly fraudulent;determining based at least in part on the potential fraud indication, that the first application or the first electronic request is fraudulent; andgenerating and transmitting, to the tax authority, electronic instructions to stop processing the first application as requested by the first electronic request.
  • 10. The non-transitory storage medium of claim 9, wherein the first user data further includes personally identifying information (PII) associated with the first user.
  • 11. The non-transitory storage medium of claim 9, wherein the notification to the user device regarding a successful application filing of the first application is transmitted to a type of contact included in the verification data.
  • 12. The non-transitory storage medium of claim 9, wherein the instructions further comprise: transmitting, to an external third party entity, the electronic instructions to stop the processing of the first application.
  • 13. The fraud detection and alert system of claim 1, wherein the alphanumeric identifier comprises all letters, all numbers, or a mix of letters and numbers.
  • 14. The computerized method of claim 5, wherein the alphanumeric identifier comprises all letters, all numbers, or a mix of letters and numbers.
  • 15. The non-transitory storage medium of claim 9, wherein the alphanumeric identifier comprises all letters, all numbers, or a mix of letters and numbers.
  • 16. The fraud detection and alert system of claim 1, wherein the one or more physical processors are further configured by machine readable instructions to: associate the alphanumeric identifier to the first verification data stored on the one or more data stores.
  • 17. The computerized method of claim 5, further comprising: associating the alphanumeric identifier to the first verification data stored on the one or more data stores.
  • 18. The non-transitory storage medium of claim 9, wherein the instructions further comprise: associating the alphanumeric identifier to the first verification data stored on the one or more data stores.
CROSS-REFERENCE AND PRIORITY

This application claims the benefit of priority of U.S. Provisional Patent Application Ser. No. 62/586,014, filed Nov. 14, 2017, the entirety of which is hereby incorporated herein by reference for all purposes.

US Referenced Citations (1023)
Number Name Date Kind
2074513 Mills Mar 1937 A
3316395 Lavin et al. Apr 1967 A
3752904 Waterbury Aug 1973 A
4163290 Sutherlin et al. Jul 1979 A
5274547 Zoffel et al. Dec 1993 A
5323315 Highbloom Jun 1994 A
5414833 Hershey et al. May 1995 A
5454030 de Oliveira et al. Sep 1995 A
5504675 Cragun et al. Apr 1996 A
5563783 Stolfo et al. Oct 1996 A
5627886 Bowman May 1997 A
5679940 Templeton et al. Oct 1997 A
5696907 Tom Dec 1997 A
5696965 Dedrick Dec 1997 A
5739512 Tognazzini Apr 1998 A
5742775 King Apr 1998 A
5745654 Titan Apr 1998 A
5752242 Havens May 1998 A
5754632 Smith May 1998 A
5774868 Cragun et al. Jun 1998 A
5809478 Greco et al. Sep 1998 A
5819226 Gopinathan et al. Oct 1998 A
5819260 Lu et al. Oct 1998 A
5822741 Fischthal Oct 1998 A
5832068 Smith Nov 1998 A
5842178 Giovannoli Nov 1998 A
5870721 Norris Feb 1999 A
5872921 Zahariev et al. Feb 1999 A
5878403 DeFrancesco Mar 1999 A
5879297 Haynor et al. Mar 1999 A
5884289 Anderson et al. Mar 1999 A
5912839 Ovshinsky et al. Jun 1999 A
5913196 Talmor et al. Jun 1999 A
5943666 Kleewein et al. Aug 1999 A
5950179 Buchanan et al. Sep 1999 A
5987440 O'Neil et al. Nov 1999 A
5999907 Donner Dec 1999 A
5999940 Ranger Dec 1999 A
6023694 Kouchi et al. Feb 2000 A
6029139 Cunningham et al. Feb 2000 A
6029149 Dykstra et al. Feb 2000 A
6029154 Pettitt Feb 2000 A
6029194 Tilt Feb 2000 A
6044357 Garg Mar 2000 A
6055570 Nielsen Apr 2000 A
6094643 Anderson et al. Jul 2000 A
6119103 Basch et al. Sep 2000 A
6125985 Amdahl et al. Oct 2000 A
6142283 Amdahl et al. Nov 2000 A
6144988 Kappel Nov 2000 A
6157707 Baulier et al. Dec 2000 A
6182219 Feldbau et al. Jan 2001 B1
6208720 Curtis et al. Mar 2001 B1
6249228 Shirk et al. Jun 2001 B1
6253203 O'Flaherty et al. Jun 2001 B1
6254000 Degen et al. Jul 2001 B1
6263447 French et al. Jul 2001 B1
6269349 Aieta et al. Jul 2001 B1
6282658 French et al. Aug 2001 B2
6285983 Jenkins Sep 2001 B1
6285987 Roth et al. Sep 2001 B1
6292795 Peters et al. Sep 2001 B1
6311169 Duhon Oct 2001 B2
6317783 Freishtat et al. Nov 2001 B1
6321339 French et al. Nov 2001 B1
6330546 Gopinathan et al. Dec 2001 B1
6397197 Gindlesperger May 2002 B1
6418436 Degen et al. Jul 2002 B1
6424956 Werbos Jul 2002 B1
6448889 Hudson Sep 2002 B1
6456984 Demoff et al. Sep 2002 B1
6496936 French et al. Dec 2002 B1
6505193 Musgrave et al. Jan 2003 B1
6510415 Talmor et al. Jan 2003 B1
6513018 Culhane Jan 2003 B1
6532459 Berson Mar 2003 B1
6542894 Lee et al. Apr 2003 B1
6543683 Hoffman Apr 2003 B2
6553495 Johansson et al. Apr 2003 B1
6571334 Feldbau et al. May 2003 B1
6597775 Lawyer et al. Jul 2003 B2
6612488 Suzuki Sep 2003 B2
6615193 Kingdon et al. Sep 2003 B1
6658393 Basch et al. Dec 2003 B1
6700220 Bayeur et al. Mar 2004 B2
6714918 Hillmer et al. Mar 2004 B2
6735572 Landesmann May 2004 B2
6740875 Ishikawa et al. May 2004 B1
6748426 Shaffer et al. Jun 2004 B1
6751626 Brown et al. Jun 2004 B2
6796497 Benkert et al. Sep 2004 B2
6811082 Wong Nov 2004 B2
6829711 Kwok et al. Dec 2004 B1
6850606 Lawyer et al. Feb 2005 B2
6857073 French et al. Feb 2005 B2
6866586 Oberberger et al. Mar 2005 B2
6871287 Ellingson Mar 2005 B1
6873979 Fishman et al. Mar 2005 B2
6898574 Regan May 2005 B1
6907408 Angel Jun 2005 B2
6908030 Rajasekaran et al. Jun 2005 B2
6913194 Suzuki Jul 2005 B2
6918038 Smith et al. Jul 2005 B1
6920435 Hoffman et al. Jul 2005 B2
6928546 Nanavati et al. Aug 2005 B1
6930707 Bates et al. Aug 2005 B2
6934849 Kramer et al. Aug 2005 B2
6934858 Woodhill Aug 2005 B2
6965881 Brickell et al. Nov 2005 B1
6965997 Dutta Nov 2005 B2
6973462 Dattero et al. Dec 2005 B2
6973575 Arnold Dec 2005 B2
6983381 Jerdonek Jan 2006 B2
6983882 Cassone Jan 2006 B2
6991174 Zuili Jan 2006 B2
6993659 Milgramm et al. Jan 2006 B2
7007174 Wheeler et al. Feb 2006 B2
7028052 Chapman et al. Apr 2006 B2
7035855 Kilger et al. Apr 2006 B1
7069240 Spero et al. Jun 2006 B2
7083090 Zuili Aug 2006 B2
7089592 Adjaoute et al. Aug 2006 B2
7092891 Maus et al. Aug 2006 B2
7104444 Suzuki Sep 2006 B2
7158622 Lawyer et al. Jan 2007 B2
7162640 Heath et al. Jan 2007 B2
7174335 Kameda Feb 2007 B2
7188078 Arnett et al. Mar 2007 B2
7203653 McIntosh Apr 2007 B1
7212995 Schulkins May 2007 B2
7222779 Pineda-Sanchez et al. May 2007 B1
7225977 Davis Jun 2007 B2
7234156 French et al. Jun 2007 B2
7240059 Bayliss et al. Jul 2007 B2
7240363 Ellingson Jul 2007 B1
7246067 Austin et al. Jul 2007 B2
7246740 Swift et al. Jul 2007 B2
7254560 Singhal Aug 2007 B2
7263506 Lee et al. Aug 2007 B2
7272728 Pierson et al. Sep 2007 B2
7272857 Everhart Sep 2007 B1
7277869 Starkman Oct 2007 B2
7277875 Serrano-Morales et al. Oct 2007 B2
7283974 Katz et al. Oct 2007 B2
7289607 Bhargava et al. Oct 2007 B2
7290704 Ball et al. Nov 2007 B1
7298873 Miller, Jr. et al. Nov 2007 B2
7310743 Gagne et al. Dec 2007 B1
7314162 Carr et al. Jan 2008 B2
7314167 Kiliccote Jan 2008 B1
7330871 Barber Feb 2008 B2
7333635 Tsantes et al. Feb 2008 B2
7340042 Cluff et al. Mar 2008 B2
7343149 Benco Mar 2008 B2
7356516 Richey et al. Apr 2008 B2
7370044 Mulhern et al. May 2008 B2
7370351 Ramachandran et al. May 2008 B1
7376618 Anderson et al. May 2008 B1
7383227 Weinflash et al. Jun 2008 B2
7386448 Poss et al. Jun 2008 B1
7386506 Aoki et al. Jun 2008 B2
7392534 Lu et al. Jun 2008 B2
7395273 Khan et al. Jul 2008 B2
7398915 Pineda-Sanchez et al. Jul 2008 B1
7418431 Nies et al. Aug 2008 B1
7428509 Klebanoff Sep 2008 B2
7433855 Gavan et al. Oct 2008 B2
7433864 Malik Oct 2008 B2
7438226 Helsper et al. Oct 2008 B2
7444518 Dharmarajan et al. Oct 2008 B1
7457401 Lawyer et al. Nov 2008 B2
7458508 Shao et al. Dec 2008 B1
7466235 Kolb et al. Dec 2008 B1
7467401 Cicchitto Dec 2008 B2
7480631 Merced et al. Jan 2009 B1
7481363 Zuili Jan 2009 B2
7490052 Kilger et al. Feb 2009 B2
7490356 Lieblich et al. Feb 2009 B2
7497374 Helsper et al. Mar 2009 B2
7509117 Yum Mar 2009 B2
7512221 Toms Mar 2009 B2
7519558 Ballard et al. Apr 2009 B2
7522060 Tumperi et al. Apr 2009 B1
7533808 Song et al. May 2009 B2
7536346 Aliffi et al. May 2009 B2
7540021 Page May 2009 B2
7542993 Satterfield et al. Jun 2009 B2
7543739 Brown et al. Jun 2009 B2
7543740 Greene et al. Jun 2009 B2
7546271 Chmielewski et al. Jun 2009 B1
7548886 Kirkland et al. Jun 2009 B2
7552467 Lindsay Jun 2009 B2
7562184 Henmi et al. Jul 2009 B2
7562814 Shao et al. Jul 2009 B1
7568616 Zuili Aug 2009 B2
7575157 Barnhardt et al. Aug 2009 B2
7580884 Cook Aug 2009 B2
7581112 Brown et al. Aug 2009 B2
7584146 Duhon Sep 2009 B1
7587368 Felsher Sep 2009 B2
7591425 Zuili et al. Sep 2009 B1
7593891 Kornegay et al. Sep 2009 B2
7606401 Hoffman et al. Oct 2009 B2
7606790 Levy Oct 2009 B2
7610216 May et al. Oct 2009 B1
7610229 Kornegay Oct 2009 B1
7610243 Haggerty et al. Oct 2009 B2
7620596 Knudson et al. Nov 2009 B2
7623844 Herrmann et al. Nov 2009 B2
7630924 Collins et al. Dec 2009 B1
7630932 Danaher et al. Dec 2009 B2
7636853 Cluts et al. Dec 2009 B2
7644868 Hare Jan 2010 B2
7647344 Skurtovich, Jr. et al. Jan 2010 B2
7647645 Edeki et al. Jan 2010 B2
7653593 Zarikian et al. Jan 2010 B2
7657431 Hayakawa Feb 2010 B2
7668769 Baker et al. Feb 2010 B2
7668840 Bayliss et al. Feb 2010 B2
7668921 Proux et al. Feb 2010 B2
7672865 Kumar et al. Mar 2010 B2
7673793 Greene et al. Mar 2010 B2
7676418 Chung et al. Mar 2010 B1
7676433 Ross et al. Mar 2010 B1
7685096 Margolus et al. Mar 2010 B2
7686214 Shao et al. Mar 2010 B1
7689007 Bous et al. Mar 2010 B2
7689505 Kasower Mar 2010 B2
7689506 Fei et al. Mar 2010 B2
7690032 Peirce Mar 2010 B1
7701364 Zilberman Apr 2010 B1
7702550 Perg et al. Apr 2010 B2
7707163 Anzalone et al. Apr 2010 B2
7708190 Brandt et al. May 2010 B2
7708200 Helsper et al. May 2010 B2
7711635 Steele et al. May 2010 B2
7711636 Robida et al. May 2010 B2
7720750 Brody May 2010 B2
7725300 Pinto et al. May 2010 B2
7734523 Cui et al. Jun 2010 B1
7735125 Alvarez et al. Jun 2010 B1
7742982 Chaudhuri et al. Jun 2010 B2
7747520 Livermore et al. Jun 2010 B2
7747521 Serio Jun 2010 B2
7747559 Leitner et al. Jun 2010 B2
7752084 Pettitt Jul 2010 B2
7752236 Williams et al. Jul 2010 B2
7752554 Biggs et al. Jul 2010 B2
7756783 Crooks Jul 2010 B2
7761379 Zoldi et al. Jul 2010 B2
7761384 Madhogarhia Jul 2010 B2
7774270 MacCloskey Aug 2010 B1
7778885 Semprevivo et al. Aug 2010 B1
7779456 Dennis et al. Aug 2010 B2
7779457 Taylor Aug 2010 B2
7783515 Kumar et al. Aug 2010 B1
7788184 Kane Aug 2010 B2
7792715 Kasower Sep 2010 B1
7792864 Rice et al. Sep 2010 B1
7793835 Coggeshall et al. Sep 2010 B1
7801811 Merrell et al. Sep 2010 B1
7801828 Candella et al. Sep 2010 B2
7802104 Dickinson Sep 2010 B2
7805362 Merrell et al. Sep 2010 B1
7805391 Friedlander et al. Sep 2010 B2
7813944 Luk et al. Oct 2010 B1
7827115 Weller et al. Nov 2010 B2
7832006 Chen et al. Nov 2010 B2
7835983 Lefner et al. Nov 2010 B2
7840459 Loftesness et al. Nov 2010 B1
7841004 Balducci et al. Nov 2010 B1
7844520 Franklin Nov 2010 B1
7848987 Haig Dec 2010 B2
7849029 Crooks et al. Dec 2010 B2
7853518 Cagan Dec 2010 B2
7853526 Milana Dec 2010 B2
7853533 Eisen Dec 2010 B2
7853998 Blaisdell et al. Dec 2010 B2
7856397 Whipple et al. Dec 2010 B2
7856494 Kulkarni Dec 2010 B2
7860769 Benson Dec 2010 B2
7860783 Yang et al. Dec 2010 B2
7865427 Wright et al. Jan 2011 B2
7865439 Seifert et al. Jan 2011 B2
7865937 White et al. Jan 2011 B1
7870078 Clark et al. Jan 2011 B2
7870599 Pemmaraju Jan 2011 B2
7874488 Parkinson Jan 2011 B2
7877304 Coulter Jan 2011 B1
7877784 Chow et al. Jan 2011 B2
7882548 Heath et al. Feb 2011 B2
7890433 Singhal Feb 2011 B2
7904360 Evans Mar 2011 B2
7904367 Chung et al. Mar 2011 B2
7908242 Achanta Mar 2011 B1
7909246 Hogg et al. Mar 2011 B2
7912865 Akerman et al. Mar 2011 B2
7917715 Tallman, Jr. Mar 2011 B2
7925582 Kornegay et al. Apr 2011 B1
7929951 Stevens et al. Apr 2011 B2
7933835 Keane et al. Apr 2011 B2
7941363 Tanaka et al. May 2011 B2
7945515 Zoldi et al. May 2011 B2
7950577 Daniel May 2011 B1
7958046 Doerner et al. Jun 2011 B2
7961857 Zoldi et al. Jun 2011 B2
7962404 Metzger, II et al. Jun 2011 B1
7962467 Howard et al. Jun 2011 B2
7970679 Kasower Jun 2011 B2
7970698 Gupta et al. Jun 2011 B2
7970701 Lewis et al. Jun 2011 B2
7971246 Emigh et al. Jun 2011 B1
7975299 Balducci et al. Jul 2011 B1
7983976 Nafeh et al. Jul 2011 B2
7983979 Holland, IV Jul 2011 B2
7984849 Berghel et al. Jul 2011 B2
7988043 Davis Aug 2011 B2
7991201 Bous et al. Aug 2011 B2
7991689 Brunzell et al. Aug 2011 B1
7991716 Crooks et al. Aug 2011 B2
7991751 Peled et al. Aug 2011 B2
7995994 Khetawat et al. Aug 2011 B2
7996521 Chamberlain et al. Aug 2011 B2
8001034 Chung et al. Aug 2011 B2
8001042 Brunzell et al. Aug 2011 B1
8001153 Skurtovich, Jr. et al. Aug 2011 B2
8001597 Crooks Aug 2011 B2
8005749 Ginsberg Aug 2011 B2
8006291 Headley et al. Aug 2011 B2
8009873 Chapman Aug 2011 B2
8019678 Wright et al. Sep 2011 B2
8020763 Kowalchyk et al. Sep 2011 B1
8024263 Zarikian et al. Sep 2011 B2
8024271 Grant Sep 2011 B2
8027439 Zoldi et al. Sep 2011 B2
8027518 Baker et al. Sep 2011 B2
8027947 Hinsz et al. Sep 2011 B2
8028168 Smithies et al. Sep 2011 B2
8028326 Palmer et al. Sep 2011 B2
8028329 Whitcomb Sep 2011 B2
8028896 Carter et al. Oct 2011 B2
8032448 Anderson et al. Oct 2011 B2
8032449 Hu et al. Oct 2011 B2
8032927 Ross Oct 2011 B2
8037097 Guo et al. Oct 2011 B2
8037512 Wright et al. Oct 2011 B2
8041597 Li et al. Oct 2011 B2
8042159 Basner et al. Oct 2011 B2
8042193 Piliouras Oct 2011 B1
8049596 Sato Nov 2011 B2
8055667 Levy Nov 2011 B2
8056128 Dingle et al. Nov 2011 B1
8058972 Mohanty Nov 2011 B2
8060424 Kasower Nov 2011 B2
8060915 Voice et al. Nov 2011 B2
8060916 Bajaj et al. Nov 2011 B2
8065233 Lee et al. Nov 2011 B2
8065525 Zilberman Nov 2011 B2
8069053 Gervais et al. Nov 2011 B2
8069084 Mackouse Nov 2011 B2
8069256 Rasti Nov 2011 B2
8069485 Carter Nov 2011 B2
8078569 Kennel Dec 2011 B2
8090648 Zoldi et al. Jan 2012 B2
8104679 Brown Jan 2012 B2
8116731 Buhrmann et al. Feb 2012 B2
8121962 Vaiciulis et al. Feb 2012 B2
8131615 Diev et al. Mar 2012 B2
8151327 Eisen Apr 2012 B2
8195549 Kasower Jun 2012 B2
8201257 Andres et al. Jun 2012 B1
8204774 Chwast et al. Jun 2012 B2
8214262 Semprevivo et al. Jul 2012 B1
8214285 Hu et al. Jul 2012 B2
8224723 Bosch et al. Jul 2012 B2
8225395 Atwood et al. Jul 2012 B2
8239677 Colson Aug 2012 B2
8244629 Lewis et al. Aug 2012 B2
8260914 Ranjan Sep 2012 B1
8280805 Abrahams et al. Oct 2012 B1
8280833 Miltonberger Oct 2012 B2
8285613 Coulter Oct 2012 B1
8285636 Curry et al. Oct 2012 B2
8296225 Maddipati et al. Oct 2012 B2
8296229 Yellin et al. Oct 2012 B1
8296250 Crooks et al. Oct 2012 B2
8332338 Vaiciulis et al. Dec 2012 B2
8346593 Fanelli Jan 2013 B2
8355896 Kumar et al. Jan 2013 B2
8359278 Domenikos et al. Jan 2013 B2
8364588 Celka et al. Jan 2013 B2
8374973 Herbrich et al. Feb 2013 B2
8386377 Xiong et al. Feb 2013 B1
8429070 Hu et al. Apr 2013 B2
8468090 Lesandro et al. Jun 2013 B2
8489479 Slater et al. Jul 2013 B2
8510329 Balkir et al. Aug 2013 B2
8515844 Kasower Aug 2013 B2
8516439 Brass et al. Aug 2013 B2
8543499 Haggerty et al. Sep 2013 B2
8548137 Zoldi et al. Oct 2013 B2
8548903 Becker Oct 2013 B2
8549590 de Villiers Prichard et al. Oct 2013 B1
8559607 Zoldi et al. Oct 2013 B2
8567669 Griegel et al. Oct 2013 B2
8578496 Krishnappa Nov 2013 B1
8630938 Cheng et al. Jan 2014 B2
8639920 Stack et al. Jan 2014 B2
8645301 Vaiciulis et al. Feb 2014 B2
8671115 Skurtovich, Jr. et al. Mar 2014 B2
8676684 Newman et al. Mar 2014 B2
8676726 Hore et al. Mar 2014 B2
8682755 Bucholz et al. Mar 2014 B2
8683586 Crooks Mar 2014 B2
8694427 Maddipati et al. Apr 2014 B2
8725613 Celka et al. May 2014 B1
8776225 Pierson et al. Jul 2014 B2
8781953 Kasower Jul 2014 B2
8781975 Bennett et al. Jul 2014 B2
8793777 Colson Jul 2014 B2
8805836 Hore et al. Aug 2014 B2
8812387 Samler et al. Aug 2014 B1
8819793 Gottschalk, Jr. Aug 2014 B2
8824648 Zoldi et al. Sep 2014 B2
8826393 Eisen Sep 2014 B2
8862514 Eisen Oct 2014 B2
8862526 Miltonberger Oct 2014 B2
8909664 Hopkins Dec 2014 B2
8918891 Coggeshall et al. Dec 2014 B2
8949981 Trollope et al. Feb 2015 B1
9118646 Pierson et al. Aug 2015 B2
9191403 Zoldi et al. Nov 2015 B2
9194899 Zoldi et al. Nov 2015 B2
9196004 Eisen Nov 2015 B2
9210156 Little Dec 2015 B1
9235728 Gottschalk, Jr. et al. Jan 2016 B2
9251541 Celka et al. Feb 2016 B2
9256624 Skurtovich, Jr. et al. Feb 2016 B2
9280658 Coggeshall et al. Mar 2016 B2
9361597 Britton et al. Jun 2016 B2
9367520 Zhao et al. Jun 2016 B2
9390384 Eisen Jul 2016 B2
9412141 Prichard et al. Aug 2016 B2
9531738 Zoldi et al. Dec 2016 B2
9558368 Gottschalk, Jr. et al. Jan 2017 B2
9595066 Samler et al. Mar 2017 B2
9652802 Kasower May 2017 B1
9704195 Zoldi Jul 2017 B2
9710523 Skurtovich, Jr. et al. Jul 2017 B2
9710868 Gottschalk, Jr. et al. Jul 2017 B2
9754256 Britton et al. Sep 2017 B2
9754311 Eisen Sep 2017 B2
9773227 Zoldi et al. Sep 2017 B2
9953321 Zoldi et al. Apr 2018 B2
10043213 Straub et al. Aug 2018 B2
10089679 Eisen Oct 2018 B2
10089686 Straub et al. Oct 2018 B2
10102530 Zoldi et al. Oct 2018 B2
10115153 Zoldi et al. Oct 2018 B2
10152736 Yang et al. Dec 2018 B2
10217163 Straub et al. Feb 2019 B2
10242540 Chen et al. Mar 2019 B2
10339527 Coleman Jul 2019 B1
10373061 Kennel et al. Aug 2019 B2
10430604 Spinelli et al. Oct 2019 B2
10438308 Prichard et al. Oct 2019 B2
10497034 Yang et al. Dec 2019 B2
10510025 Zoldi et al. Dec 2019 B2
10528948 Zoldi et al. Jan 2020 B2
10579938 Zoldi et al. Mar 2020 B2
10592982 Samler et al. Mar 2020 B2
10593004 Gottschalk, Jr. et al. Mar 2020 B2
20010014868 Herz et al. Aug 2001 A1
20010014878 Mitra et al. Aug 2001 A1
20010027413 Bhutta Oct 2001 A1
20010029470 Schultz et al. Oct 2001 A1
20010032158 Starkman Oct 2001 A1
20010034631 Kiselik Oct 2001 A1
20010039523 Iwamoto Nov 2001 A1
20020010684 Moskowitz Jan 2002 A1
20020013899 Faul Jan 2002 A1
20020019804 Sutton Feb 2002 A1
20020019938 Aarons Feb 2002 A1
20020032635 Harris et al. Mar 2002 A1
20020040344 Preiser et al. Apr 2002 A1
20020042879 Gould et al. Apr 2002 A1
20020052841 Guthrie et al. May 2002 A1
20020059521 Tasler May 2002 A1
20020062185 Runge et al. May 2002 A1
20020062281 Singhal May 2002 A1
20020073044 Singhal Jun 2002 A1
20020077178 Oberberger et al. Jun 2002 A1
20020077964 Brody et al. Jun 2002 A1
20020080256 Bates et al. Jun 2002 A1
20020087460 Hornung Jul 2002 A1
20020099649 Lee et al. Jul 2002 A1
20020119824 Allen Aug 2002 A1
20020130176 Suzuki Sep 2002 A1
20020138417 Lawrence Sep 2002 A1
20020138751 Dutta Sep 2002 A1
20020147695 Khedkar et al. Oct 2002 A1
20020156676 Ahrens et al. Oct 2002 A1
20020161664 Shaya et al. Oct 2002 A1
20020161711 Sartor et al. Oct 2002 A1
20020173994 Ferguson, III Nov 2002 A1
20020178112 Goeller et al. Nov 2002 A1
20020184509 Scheidt et al. Dec 2002 A1
20020188544 Wizon et al. Dec 2002 A1
20030004879 Demoff et al. Jan 2003 A1
20030009426 Ruiz-Sanchez Jan 2003 A1
20030018549 Fei et al. Jan 2003 A1
20030033261 Knegendorf Feb 2003 A1
20030046554 Leydier et al. Mar 2003 A1
20030048904 Wang et al. Mar 2003 A1
20030050882 Degen et al. Mar 2003 A1
20030057278 Wong Mar 2003 A1
20030061163 Durfield Mar 2003 A1
20030065563 Elliott et al. Apr 2003 A1
20030070101 Buscemi Apr 2003 A1
20030078877 Beirne et al. Apr 2003 A1
20030093366 Halper et al. May 2003 A1
20030097320 Gordon May 2003 A1
20030105696 Kalotay et al. Jun 2003 A1
20030115133 Bian Jun 2003 A1
20030143980 Choi et al. Jul 2003 A1
20030149744 Bierre et al. Aug 2003 A1
20030153299 Perfit et al. Aug 2003 A1
20030158751 Suresh et al. Aug 2003 A1
20030158960 Engberg Aug 2003 A1
20030182214 Taylor Sep 2003 A1
20030195859 Lawrence Oct 2003 A1
20030200447 Sjoblom Oct 2003 A1
20030208428 Raynes et al. Nov 2003 A1
20030222500 Bayeur et al. Dec 2003 A1
20030225656 Aberman et al. Dec 2003 A1
20030225692 Bosch et al. Dec 2003 A1
20030225742 Tenner et al. Dec 2003 A1
20030233278 Marshall Dec 2003 A1
20040004117 Suzuki Jan 2004 A1
20040005912 Hubbe et al. Jan 2004 A1
20040010698 Rolfe Jan 2004 A1
20040024709 Yu et al. Feb 2004 A1
20040026496 Zuili Feb 2004 A1
20040030649 Nelson et al. Feb 2004 A1
20040039586 Garvey et al. Feb 2004 A1
20040054619 Watson et al. Mar 2004 A1
20040059653 Verkuylen et al. Mar 2004 A1
20040064401 Palaghita et al. Apr 2004 A1
20040078324 Lonnberg et al. Apr 2004 A1
20040103147 Flesher et al. May 2004 A1
20040107363 Monteverde Jun 2004 A1
20040110119 Riconda et al. Jun 2004 A1
20040111305 Gavan et al. Jun 2004 A1
20040111335 Black et al. Jun 2004 A1
20040117235 Shacham Jun 2004 A1
20040128227 Whipple et al. Jul 2004 A1
20040128232 Descloux Jul 2004 A1
20040133440 Carolan et al. Jul 2004 A1
20040143526 Monasterio et al. Jul 2004 A1
20040149820 Zuili Aug 2004 A1
20040149827 Zuili Aug 2004 A1
20040153330 Miller et al. Aug 2004 A1
20040153656 Cluts et al. Aug 2004 A1
20040158520 Noh Aug 2004 A1
20040158523 Dort Aug 2004 A1
20040158723 Root Aug 2004 A1
20040167793 Masuoka et al. Aug 2004 A1
20040177046 Ogram Sep 2004 A1
20040193538 Raines Sep 2004 A1
20040199456 Flint et al. Oct 2004 A1
20040199462 Starrs Oct 2004 A1
20040204948 Singletary et al. Oct 2004 A1
20040225594 Nolan, III et al. Nov 2004 A1
20040230448 Schaich Nov 2004 A1
20040230527 Hansen et al. Nov 2004 A1
20040230538 Clifton et al. Nov 2004 A1
20040234117 Tibor Nov 2004 A1
20040243514 Wankmueller Dec 2004 A1
20040243518 Clifton et al. Dec 2004 A1
20040243567 Levy Dec 2004 A1
20040250085 Tattan et al. Dec 2004 A1
20040255127 Arnouse Dec 2004 A1
20040260922 Goodman et al. Dec 2004 A1
20050001028 Zuili Jan 2005 A1
20050005168 Dick Jan 2005 A1
20050010513 Duckworth et al. Jan 2005 A1
20050010780 Kane et al. Jan 2005 A1
20050021476 Candella et al. Jan 2005 A1
20050021519 Ghouri Jan 2005 A1
20050027983 Klawon Feb 2005 A1
20050038726 Salomon et al. Feb 2005 A1
20050038737 Norris Feb 2005 A1
20050050577 Westbrook et al. Mar 2005 A1
20050058262 Timmins et al. Mar 2005 A1
20050065950 Chaganti et al. Mar 2005 A1
20050071282 Lu et al. Mar 2005 A1
20050075985 Cartmell Apr 2005 A1
20050081052 Washington Apr 2005 A1
20050086161 Gallant Apr 2005 A1
20050091164 Varble Apr 2005 A1
20050097039 Kulcsar et al. May 2005 A1
20050097051 Madill, Jr. et al. May 2005 A1
20050097364 Edeki et al. May 2005 A1
20050102206 Savasoglu et al. May 2005 A1
20050105719 Huda May 2005 A1
20050125226 Magee Jun 2005 A1
20050125686 Brandt Jun 2005 A1
20050138391 Mandalia et al. Jun 2005 A1
20050144143 Freiberg Jun 2005 A1
20050154664 Guy et al. Jul 2005 A1
20050154665 Kerr Jul 2005 A1
20050154671 Doan et al. Jul 2005 A1
20050165667 Cox Jul 2005 A1
20050197953 Broadbent et al. Sep 2005 A1
20050203885 Chenevich et al. Sep 2005 A1
20050216953 Ellingson Sep 2005 A1
20050229007 Bolle et al. Oct 2005 A1
20050240578 Biederman et al. Oct 2005 A1
20050242173 Suzuki Nov 2005 A1
20050251474 Shinn et al. Nov 2005 A1
20050256809 Sadri Nov 2005 A1
20050262014 Fickes Nov 2005 A1
20050273333 Morin et al. Dec 2005 A1
20050278542 Pierson et al. Dec 2005 A1
20050279827 Mascavage et al. Dec 2005 A1
20050279869 Barklage Dec 2005 A1
20060004663 Singhal Jan 2006 A1
20060014129 Coleman et al. Jan 2006 A1
20060032909 Seegar Feb 2006 A1
20060041464 Powers et al. Feb 2006 A1
20060045105 Dobosz et al. Mar 2006 A1
20060047605 Ahmad Mar 2006 A1
20060059073 Walzak Mar 2006 A1
20060059110 Madhok et al. Mar 2006 A1
20060064374 Helsper et al. Mar 2006 A1
20060074798 Din et al. Apr 2006 A1
20060074986 Mallalieu et al. Apr 2006 A1
20060080230 Freiberg Apr 2006 A1
20060080263 Willis et al. Apr 2006 A1
20060089905 Song et al. Apr 2006 A1
20060101508 Taylor May 2006 A1
20060106605 Saunders et al. May 2006 A1
20060112279 Cohen et al. May 2006 A1
20060112280 Cohen et al. May 2006 A1
20060129428 Wennberg Jun 2006 A1
20060129481 Bhatt et al. Jun 2006 A1
20060129840 Milgramm et al. Jun 2006 A1
20060131390 Kim Jun 2006 A1
20060136332 Ziegler Jun 2006 A1
20060140460 Coutts Jun 2006 A1
20060143073 Engel et al. Jun 2006 A1
20060144924 Stover Jul 2006 A1
20060149580 Helsper et al. Jul 2006 A1
20060149674 Cook et al. Jul 2006 A1
20060161435 Atef et al. Jul 2006 A1
20060173776 Shalley et al. Aug 2006 A1
20060173792 Glass Aug 2006 A1
20060177226 Ellis, III Aug 2006 A1
20060178971 Owen et al. Aug 2006 A1
20060179004 Fuchs Aug 2006 A1
20060195351 Bayburtian Aug 2006 A1
20060200855 Willis Sep 2006 A1
20060202012 Grano et al. Sep 2006 A1
20060204051 Holland, IV Sep 2006 A1
20060206725 Milgramm et al. Sep 2006 A1
20060212386 Willey et al. Sep 2006 A1
20060218069 Aberman et al. Sep 2006 A1
20060229961 Lyftogt et al. Oct 2006 A1
20060239512 Petrillo Oct 2006 A1
20060239513 Song et al. Oct 2006 A1
20060242046 Haggerty et al. Oct 2006 A1
20060242047 Haggerty et al. Oct 2006 A1
20060253358 Delgrosso et al. Nov 2006 A1
20060253583 Dixon et al. Nov 2006 A1
20060255914 Westman Nov 2006 A1
20060262929 Vatanen et al. Nov 2006 A1
20060265243 Racho et al. Nov 2006 A1
20060271456 Romain et al. Nov 2006 A1
20060271457 Romain et al. Nov 2006 A1
20060271633 Adler Nov 2006 A1
20060273158 Suzuki Dec 2006 A1
20060277043 Tomes et al. Dec 2006 A1
20060282285 Helsper et al. Dec 2006 A1
20060282372 Endres et al. Dec 2006 A1
20060282395 Leibowitz Dec 2006 A1
20060287765 Kraft Dec 2006 A1
20060288090 Kraft Dec 2006 A1
20060294023 Lu Dec 2006 A1
20070005508 Chiang Jan 2007 A1
20070011100 Libin et al. Jan 2007 A1
20070016500 Chatterji et al. Jan 2007 A1
20070016521 Wang Jan 2007 A1
20070016522 Wang Jan 2007 A1
20070022141 Singleton et al. Jan 2007 A1
20070038483 Wood Feb 2007 A1
20070038568 Greene et al. Feb 2007 A1
20070040017 Kozlay Feb 2007 A1
20070040019 Berghel et al. Feb 2007 A1
20070043577 Kasower Feb 2007 A1
20070047770 Swope et al. Mar 2007 A1
20070048765 Abramson Mar 2007 A1
20070050638 Rasti Mar 2007 A1
20070059442 Sabeta Mar 2007 A1
20070061273 Greene et al. Mar 2007 A1
20070067207 Haggerty et al. Mar 2007 A1
20070067297 Kublickis Mar 2007 A1
20070072190 Aggarwal Mar 2007 A1
20070073622 Kane Mar 2007 A1
20070073630 Greene et al. Mar 2007 A1
20070078786 Bous et al. Apr 2007 A1
20070078908 Rohatgi et al. Apr 2007 A1
20070078985 Shao et al. Apr 2007 A1
20070083460 Bachenheimer Apr 2007 A1
20070087795 Aletto et al. Apr 2007 A1
20070093234 Willis et al. Apr 2007 A1
20070094137 Phillips et al. Apr 2007 A1
20070094264 Nair Apr 2007 A1
20070100774 Abdon May 2007 A1
20070106582 Baker et al. May 2007 A1
20070106611 Larsen May 2007 A1
20070107050 Selvarajan May 2007 A1
20070109103 Jedrey et al. May 2007 A1
20070110282 Millsapp May 2007 A1
20070112667 Rucker May 2007 A1
20070112668 Celano et al. May 2007 A1
20070118393 Rosen et al. May 2007 A1
20070155411 Morrison Jul 2007 A1
20070157299 Hare Jul 2007 A1
20070168246 Haggerty et al. Jul 2007 A1
20070168480 Biggs et al. Jul 2007 A1
20070174208 Black et al. Jul 2007 A1
20070179903 Seinfeld et al. Aug 2007 A1
20070180209 Tallman Aug 2007 A1
20070180263 Delgrosso et al. Aug 2007 A1
20070186276 McRae et al. Aug 2007 A1
20070192248 West Aug 2007 A1
20070192853 Shraim et al. Aug 2007 A1
20070198410 Labgold et al. Aug 2007 A1
20070205266 Carr et al. Sep 2007 A1
20070208669 Rivette et al. Sep 2007 A1
20070214037 Shubert et al. Sep 2007 A1
20070214365 Cornett et al. Sep 2007 A1
20070219928 Madhogarhia Sep 2007 A1
20070220594 Tulsyan Sep 2007 A1
20070226093 Chan et al. Sep 2007 A1
20070226129 Liao et al. Sep 2007 A1
20070233614 McNelley et al. Oct 2007 A1
20070234427 Gardner et al. Oct 2007 A1
20070244782 Chimento Oct 2007 A1
20070244807 Andringa et al. Oct 2007 A1
20070250704 Hallam-Baker Oct 2007 A1
20070250920 Lindsay Oct 2007 A1
20070266439 Kraft Nov 2007 A1
20070282730 Carpenter et al. Dec 2007 A1
20070288355 Roland et al. Dec 2007 A1
20070288360 Seeklus Dec 2007 A1
20070288559 Parsadayan Dec 2007 A1
20070291995 Rivera Dec 2007 A1
20070292006 Johnson Dec 2007 A1
20070294104 Boaz et al. Dec 2007 A1
20070299759 Kelly Dec 2007 A1
20080010203 Grant Jan 2008 A1
20080010683 Baddour et al. Jan 2008 A1
20080010687 Gonen et al. Jan 2008 A1
20080015887 Drabek et al. Jan 2008 A1
20080021804 Deckoff Jan 2008 A1
20080027857 Benson Jan 2008 A1
20080027858 Benson Jan 2008 A1
20080052182 Marshall Feb 2008 A1
20080059236 Cartier Mar 2008 A1
20080059352 Chandran Mar 2008 A1
20080059364 Tidwell et al. Mar 2008 A1
20080059366 Fou Mar 2008 A1
20080063172 Ahuja et al. Mar 2008 A1
20080066188 Kwak Mar 2008 A1
20080071882 Hering et al. Mar 2008 A1
20080076386 Khetawat et al. Mar 2008 A1
20080077526 Arumugam Mar 2008 A1
20080098222 Zilberman Apr 2008 A1
20080103798 Domenikos et al. May 2008 A1
20080103799 Domenikos et al. May 2008 A1
20080103800 Domenikos et al. May 2008 A1
20080103811 Sosa May 2008 A1
20080103972 Lanc May 2008 A1
20080104021 Cai et al. May 2008 A1
20080104672 Lunde et al. May 2008 A1
20080114837 Biggs et al. May 2008 A1
20080120237 Lin May 2008 A1
20080126116 Singhai May 2008 A1
20080126233 Hogan May 2008 A1
20080147454 Walker et al. Jun 2008 A1
20080154758 Schattmaier et al. Jun 2008 A1
20080162202 Khanna et al. Jul 2008 A1
20080162383 Kraft Jul 2008 A1
20080167883 Thavildar Khazaneh Jul 2008 A1
20080175360 Schwarz et al. Jul 2008 A1
20080177655 Zalik Jul 2008 A1
20080177841 Sinn et al. Jul 2008 A1
20080189789 Lamontagne Aug 2008 A1
20080208548 Metzger et al. Aug 2008 A1
20080208610 Thomas et al. Aug 2008 A1
20080208726 Tsantes et al. Aug 2008 A1
20080217400 Portano Sep 2008 A1
20080228635 Megdal et al. Sep 2008 A1
20080243680 Megdal et al. Oct 2008 A1
20080244717 Jelatis et al. Oct 2008 A1
20080255922 Feldman et al. Oct 2008 A1
20080255992 Lin Oct 2008 A1
20080256613 Grover Oct 2008 A1
20080281737 Fajardo Nov 2008 A1
20080281743 Pettit Nov 2008 A1
20080288382 Smith et al. Nov 2008 A1
20080288430 Friedlander et al. Nov 2008 A1
20080288790 Wilson Nov 2008 A1
20080294540 Celka et al. Nov 2008 A1
20080294689 Metzger et al. Nov 2008 A1
20080296367 Parkinson Dec 2008 A1
20080296382 Connell, II et al. Dec 2008 A1
20080300877 Gilbert et al. Dec 2008 A1
20080319889 Hammad Dec 2008 A1
20090007220 Ormazabal et al. Jan 2009 A1
20090018934 Peng et al. Jan 2009 A1
20090021349 Errico et al. Jan 2009 A1
20090024417 Marks et al. Jan 2009 A1
20090024505 Patel et al. Jan 2009 A1
20090024636 Shiloh Jan 2009 A1
20090024663 McGovern Jan 2009 A1
20090026270 Connell, II et al. Jan 2009 A1
20090043637 Eder Feb 2009 A1
20090044279 Crawford et al. Feb 2009 A1
20090048957 Celano Feb 2009 A1
20090079539 Johnson Mar 2009 A1
20090094311 Awadallah et al. Apr 2009 A1
20090099960 Robida et al. Apr 2009 A1
20090106153 Ezra Apr 2009 A1
20090106846 Dupray et al. Apr 2009 A1
20090112650 Iwane Apr 2009 A1
20090119106 Rajakumar et al. May 2009 A1
20090119299 Rhodes May 2009 A1
20090125369 Kloostra et al. May 2009 A1
20090125439 Zarikian et al. May 2009 A1
20090125463 Hido May 2009 A1
20090138391 Dudley et al. May 2009 A1
20090141318 Hughes Jun 2009 A1
20090151005 Bell et al. Jun 2009 A1
20090158404 Hahn et al. Jun 2009 A1
20090164380 Brown Jun 2009 A1
20090172815 Gu et al. Jul 2009 A1
20090182653 Zimiles Jul 2009 A1
20090199264 Lang Aug 2009 A1
20090205032 Hinton et al. Aug 2009 A1
20090206993 Di Mambro et al. Aug 2009 A1
20090216560 Siegel Aug 2009 A1
20090222308 Zoldi et al. Sep 2009 A1
20090222362 Stood et al. Sep 2009 A1
20090222373 Choudhuri et al. Sep 2009 A1
20090222374 Choudhuri et al. Sep 2009 A1
20090222375 Choudhuri et al. Sep 2009 A1
20090222376 Choudhuri et al. Sep 2009 A1
20090222377 Choudhuri et al. Sep 2009 A1
20090222378 Choudhuri et al. Sep 2009 A1
20090222379 Choudhuri et al. Sep 2009 A1
20090222380 Choudhuri et al. Sep 2009 A1
20090222897 Carow et al. Sep 2009 A1
20090224875 Rabinowitz et al. Sep 2009 A1
20090224889 Aggarwal et al. Sep 2009 A1
20090226056 Vlachos et al. Sep 2009 A1
20090234738 Britton et al. Sep 2009 A1
20090240609 Cho et al. Sep 2009 A1
20090241168 Readshaw Sep 2009 A1
20090241173 Troyansky Sep 2009 A1
20090248198 Siegel et al. Oct 2009 A1
20090248497 Hueter Oct 2009 A1
20090248567 Haggerty et al. Oct 2009 A1
20090248568 Haggerty et al. Oct 2009 A1
20090248569 Haggerty et al. Oct 2009 A1
20090248570 Haggerty et al. Oct 2009 A1
20090248571 Haggerty et al. Oct 2009 A1
20090248572 Haggerty et al. Oct 2009 A1
20090248573 Haggerty et al. Oct 2009 A1
20090254476 Sharma et al. Oct 2009 A1
20090254484 Forero et al. Oct 2009 A1
20090257595 de Cesare et al. Oct 2009 A1
20090259470 Chang Oct 2009 A1
20090259560 Bachenheimer Oct 2009 A1
20090259588 Lindsay Oct 2009 A1
20090259855 de Cesare et al. Oct 2009 A1
20090261189 Ellis, Jr. Oct 2009 A1
20090270126 Liu Oct 2009 A1
20090271265 Lay et al. Oct 2009 A1
20090271617 Song et al. Oct 2009 A1
20090272801 Connell, II et al. Nov 2009 A1
20090276244 Baldwin, Jr. et al. Nov 2009 A1
20090281945 Shakkarwar Nov 2009 A1
20090281951 Shakkarwar Nov 2009 A1
20090289110 Regen et al. Nov 2009 A1
20090300066 Guo et al. Dec 2009 A1
20090307778 Mardikar Dec 2009 A1
20090326972 Washington Dec 2009 A1
20090328173 Jakobson et al. Dec 2009 A1
20100024037 Grzymala-Busse et al. Jan 2010 A1
20100030677 Melik-Aslanian et al. Feb 2010 A1
20100031030 Kao et al. Feb 2010 A1
20100037147 Champion et al. Feb 2010 A1
20100037308 Lin et al. Feb 2010 A1
20100042526 Martinov Feb 2010 A1
20100043055 Baumgart Feb 2010 A1
20100070620 Awadallah et al. Mar 2010 A1
20100077006 El Emam et al. Mar 2010 A1
20100085146 Johnson Apr 2010 A1
20100088233 Tattan et al. Apr 2010 A1
20100088338 Pavoni, Jr. et al. Apr 2010 A1
20100094664 Bush et al. Apr 2010 A1
20100094767 Miltonberger Apr 2010 A1
20100094768 Miltonberger Apr 2010 A1
20100094910 Bayliss Apr 2010 A1
20100095357 Willis et al. Apr 2010 A1
20100100406 Lim Apr 2010 A1
20100100945 Ozzie et al. Apr 2010 A1
20100107225 Spencer et al. Apr 2010 A1
20100114724 Ghosh et al. May 2010 A1
20100114744 Gonen May 2010 A1
20100121767 Coulter et al. May 2010 A1
20100130172 Vendrow et al. May 2010 A1
20100131273 Aley-Raz et al. May 2010 A1
20100132043 Bjorn et al. May 2010 A1
20100145836 Baker et al. Jun 2010 A1
20100158207 Dhawan et al. Jun 2010 A1
20100169210 Bous et al. Jul 2010 A1
20100169947 Sarmah et al. Jul 2010 A1
20100188684 Kumara Jul 2010 A1
20100205662 Ibrahim et al. Aug 2010 A1
20100217837 Ansari et al. Aug 2010 A1
20100218255 Ritman et al. Aug 2010 A1
20100228649 Pettitt Sep 2010 A1
20100228657 Kagarlis Sep 2010 A1
20100229225 Sarmah et al. Sep 2010 A1
20100229230 Edeki et al. Sep 2010 A1
20100229245 Singhal Sep 2010 A1
20100241501 Marshall Sep 2010 A1
20100250364 Song et al. Sep 2010 A1
20100250411 Ogrodski Sep 2010 A1
20100250509 Andersen Sep 2010 A1
20100250955 Trevithick et al. Sep 2010 A1
20100268557 Faith et al. Oct 2010 A1
20100274679 Hammad Oct 2010 A1
20100275265 Fiske et al. Oct 2010 A1
20100293090 Domenikos et al. Nov 2010 A1
20100293114 Khan et al. Nov 2010 A1
20100302157 Zilberman Dec 2010 A1
20100306101 Lefner et al. Dec 2010 A1
20100313273 Freas Dec 2010 A1
20100325035 Hilgers et al. Dec 2010 A1
20100325442 Petrone et al. Dec 2010 A1
20100332292 Anderson Dec 2010 A1
20100332362 Ramsey et al. Dec 2010 A1
20110004498 Readshaw Jan 2011 A1
20110016042 Cho et al. Jan 2011 A1
20110040983 Grzymala-Busse et al. Feb 2011 A1
20110047071 Choudhuri et al. Feb 2011 A1
20110066547 Clark et al. Mar 2011 A1
20110082768 Eisen Apr 2011 A1
20110093383 Haggerty et al. Apr 2011 A1
20110112958 Haggerty et al. May 2011 A1
20110119291 Rice May 2011 A1
20110126024 Beatson et al. May 2011 A1
20110126275 Anderson et al. May 2011 A1
20110145899 Cao et al. Jun 2011 A1
20110166988 Coulter Jul 2011 A1
20110184838 Winters et al. Jul 2011 A1
20110184851 Megdal et al. Jul 2011 A1
20110196791 Dominguez Aug 2011 A1
20110238566 Santos Sep 2011 A1
20110260832 Ross et al. Oct 2011 A1
20110276496 Neville et al. Nov 2011 A1
20110282778 Wright et al. Nov 2011 A1
20110289032 Crooks et al. Nov 2011 A1
20110289322 Rasti Nov 2011 A1
20110295721 MacDonald Dec 2011 A1
20110295750 Rammal Dec 2011 A1
20110296529 Bhanoo et al. Dec 2011 A1
20110302412 Deng et al. Dec 2011 A1
20110302641 Hald et al. Dec 2011 A1
20120030080 Slater et al. Feb 2012 A1
20120030083 Newman et al. Feb 2012 A1
20120030771 Pierson et al. Feb 2012 A1
20120066073 Dilip et al. Mar 2012 A1
20120101939 Kasower Apr 2012 A1
20120158574 Brunzell et al. Jun 2012 A1
20120158654 Behren et al. Jun 2012 A1
20120198556 Patel et al. Aug 2012 A1
20120215682 Lent et al. Aug 2012 A1
20120278227 Kolo et al. Nov 2012 A1
20120290660 Rao et al. Nov 2012 A1
20130004033 Trugenberger et al. Jan 2013 A1
20130185293 Boback Jul 2013 A1
20130218797 Prichard et al. Aug 2013 A1
20140007238 Magee et al. Jan 2014 A1
20140058910 Abeles Feb 2014 A1
20140149304 Bucholz et al. May 2014 A1
20140214636 Rajsky Jul 2014 A1
20150186901 Miltonberger Jul 2015 A1
20150199784 Straub et al. Jul 2015 A1
20150295924 Gottschalk, Jr. Oct 2015 A1
20160012561 Lappenbusch et al. Jan 2016 A1
20160063645 Houseworth Mar 2016 A1
20160071208 Straub et al. Mar 2016 A1
20160086262 Straub et al. Mar 2016 A1
20160328814 Prichard et al. Nov 2016 A1
20160344758 Cohen et al. Nov 2016 A1
20170053369 Gottschalk, Jr. et al. Feb 2017 A1
20170099314 Klatt et al. Apr 2017 A1
20170270629 Fitzgerald Sep 2017 A1
20170278182 Kasower Sep 2017 A1
20170287065 Samler et al. Oct 2017 A1
20170374076 Pierson et al. Dec 2017 A1
20180130157 Gottschalk, Jr. et al. May 2018 A1
20180322572 Straub et al. Nov 2018 A1
20190311366 Zoldi et al. Oct 2019 A1
20190377896 Spinelli et al. Dec 2019 A1
20200134629 Zoldi et al. Apr 2020 A1
20200145436 Brown et al. May 2020 A1
20200151628 Zoldi et al. May 2020 A1
Foreign Referenced Citations (40)
Number Date Country
104877993 Sep 2015 CN
91 08 341 Oct 1991 DE
0 554 083 Aug 1993 EP
2 939 361 Oct 2019 EP
2 392 748 Mar 2004 GB
2 518 099 Mar 2015 GB
2011-134252 Jul 2011 JP
5191376 May 2013 JP
10-2004-0034063 Apr 2004 KR
256569 Jun 2006 TW
WO 94006103 Mar 1994 WO
WO 96041488 Dec 1996 WO
WO 00055778 Sep 2000 WO
WO 00055789 Sep 2000 WO
WO 00055790 Sep 2000 WO
WO 01011522 Feb 2001 WO
WO 02027610 Apr 2002 WO
WO 02097563 Dec 2002 WO
WO 03071388 Aug 2003 WO
WO 02037219 May 2004 WO
WO 2004046882 Jun 2004 WO
WO 2006069199 Jun 2006 WO
WO 2007001394 Jan 2007 WO
WO 2007106393 Sep 2007 WO
WO 2008054403 May 2008 WO
WO 2008054849 May 2008 WO
WO 2008147918 Dec 2008 WO
WO 2009062111 May 2009 WO
WO 2009117518 Sep 2009 WO
WO 2011044036 Apr 2011 WO
WO 2012054646 Apr 2012 WO
WO 2012112781 Aug 2012 WO
WO 2013026343 Feb 2013 WO
WO 2013126281 Aug 2013 WO
WO 2014008079 Jan 2014 WO
WO 2014008247 Jan 2014 WO
WO 2014150987 Sep 2014 WO
WO 2018175440 Sep 2018 WO
WO 2018208770 Nov 2018 WO
WO 2019006272 Jan 2019 WO
Non-Patent Literature Citations (104)
Entry
“The Return Review Program Increases Fraud Detection; However, Full Retirement of the Electronic Fraud Detection System Will Be Delayed”, Treasury Inspector General for Tax Administration (Year: 2017).
Official Communication in Australian Patent Application No. 2017203586, dated Jun. 18, 2019.
U.S. Appl. No. 09/557,252, filed Apr. 24, 2000, Page.
U.S. Appl. No. 12/705,489, filed Feb. 12, 2010, Bargoli et al.
U.S. Appl. No. 12/705,511, filed Feb. 12, 2010, Bargoli et al.
“A New Approach to Fraud Solutions”, BasePoint Science Solving Fraud, pp. 8, 2006.
AAD et al., “NRC Data Collection and the Privacy by Design Principles”, IEEE, Nov. 2010, pp. 5.
“Arizona Company Has Found Key in Stopping ID Theft,” PR Newswire, New York, Aug. 10, 2005 http://proquest.umi.com/pqdweb?did=880104711&sid=1&Fmt=3&clientId=19649&RQT=309&Vname=PQD.
ABC News Now: Money Matters, as broadcasted Nov. 15, 2005 with guest Todd Davis (CEO of Lifelock), pp. 6.
Anonymous, “Feedback”, Credit Management, ABI/INFORM Global, Sep. 2006, pp. 6.
“Beverly Hills Man Convicted of Operating ‘Bust-Out’ Schemes that Caused More than $8 Million in Losses”, Department of Justice, Jul. 25, 2006, 2 Pgs.
Bielski, Lauren, “Will you Spend to Thwart ID Theft?” ABA Banking Journal, Apr. 2005, pp. 54, 56-57, 60.
BlueCava, “What We Do”, http://www.bluecava.com/what-we-do/, printed Nov. 5, 2012 in 3 pages.
“Bust-Out Schemes”, Visual Analytics Inc. Technical Product Support, Newsletter vol. 4, Issue 1, Jan. 2005, pp. 7.
Chores & Allowances, “Do Kids Have Credit Reports?” Oct. 15, 2007, http://choresandallowances.blogspot.com/2007/10/do-kids-have-credit-reports.html, pp. 5.
Cowie, Norman, “Warning Bells & ‘The Bust-Out’”, Business Credit, Jul. 1, 2000, pp. 5.
Cullen, Terri; “The Wall Street Journal Complete Identity Theft Guidebook:How to Protect Yourself from the Most Pervasive Crime in America”; Chapter 3, pp. 59-79; Jul. 10, 2007.
“Data Loss Prevention (DLP) Software”, http://www.symantec.com/data-loss-prevention/ printed Apr. 8, 2013 in 8 pages.
“Data Protection”, http://compliantprocessing.com/data-protection/ printed Apr. 8, 2013 in 4 pages.
Day, Jo and Kevin; “ID-ology: A Planner's Guide to Identity Theft”; Journal of Financial Planning:Tech Talk; pp. 36-38; Sep. 2004.
eFunds Corporation, “Data & Decisioning: Debit Report” printed Apr. 1, 2007, http://www.efunds.com/web/industry-solutions/financial-services/frm-debit-report/htm in 1 page.
Equifax; “Equifax Credit Watch”; https://www.econsumer.equifax.co.uk/consumer/uk/sitepage.ehtml, dated Jun. 27, 2007 on www.archive.org.
Experian Team, “Impact on Credit Scores of Inquiries for an Auto Loan,” Ask Experian, Mar. 1, 2009, pp. 5.
“Fair Isaac Introduces Falcon One System to Combat Fraud at Every Customer Interaction”, Business Wire, May 5, 2005, pp. 3.
“Fair Isaac Offers New Fraud Tool”, National Mortgage News & Source Media, Inc., Jun. 13, 2005, pp. 2.
FamilySecure.com, “Frequently Asked Questions”, http://www.familysecure.com/FAQ.aspx as archived Jul. 15, 2007 in 3 pages.
FamilySecure.com; “Identity Theft Protection for the Whole Family | FamilySecure.com” http://www.familysecure.com/, as retrieved on Nov. 5, 2009.
“Fighting the New Face of Fraud”, FinanceTech, http://www.financetech.com/showArticle.jhtml?articleID=167100405, Aug. 2, 2005.
“FinExtra, Basepoint Analytics Introduces Predictive Technology for Mortgage Fraud”, Oct. 5, 2005, pp. 3.
Fisher, Joseph, “Access to Fair Credit Reports: Current Practices and Proposed Legislation,” American Business Law Journal, Fall 1981, vol. 19, No. 3, p. 319.
“Fraud Alert | Learn How”. Fight Identity Theft. http://www.fightidentitytheft.com/flag.html, accessed on Nov. 5, 2009.
GIBBS, Adrienne; “Protecting Your Children from Identity Theft,” Nov. 25, 2008, http://www.creditcards.com/credit-card-news/identity-ID-theft-and-kids-children-1282.php, pp. 4.
“GLBA Compliance and FFIEC Compliance” http://www.trustwave.com/financial-services.php printed Apr. 8, 2013 in 1 page.
Gordon et al., “Identity Fraud: A Critical National and Global Threat,” LexisNexis, Oct. 28, 2003, pp. 1-48.
Haglund, Christoffer, “Two-Factor Authentication With a Mobile Phone”, Fox Technologies, Uppsala, Department of Information Technology, Nov. 2, 2007, pp. 62.
Herzberg, Amir, “Payments and Banking with Mobile Personal Devices,” Communications of the ACM, May 2003, vol. 46, No. 5, pp. 53-58.
“ID Analytics ID Network”, from www.idanalytics.com, as retrieved from www.archive.org, dated Nov. 20, 2005 or earlier; attached as “ID Network (IDNb)”, pp. 8.
ID Cops, www.idcops.com; retrieved from www.archive.org any linkage Feb. 16, 2007.
ID Theft Assist, “Do You Know Where Your Child's Credit Is?”, Nov. 26, 2007, http://www.idtheftassist.com/pages/story14, pp. 3.
“ID Thieves These Days Want Your Number, Not Your Name”, The Columbus Dispatch, Columbus, Ohio, http://www.dispatch.com/content/stories/business/2014/08/03/id-thieves-these-days-want-your-number-not-your-name.html, Aug. 3, 2014 in 2 pages.
Identity Theft Resource Center; Fact Sheet 120 A—To Order a Credit Report for a Child; Fact Sheets, Victim Resources; Apr. 30, 2007.
“Identity Thieves Beware: Lifelock Introduces Nation's First Guaranteed Proactive Solution to Identity Theft Protection,” PR Newswire, New York, Jun. 13, 2005 http://proquest.umi.com/pqdweb?did=852869731&sid=1&Fmt=3&clientId=19649&RQT=309&Vname=PQD.
“Industry News, New Technology Identifies Mortgage Fraud: Basepoint Analytics Launches FraudMark”, Inman News, American Land Title Association, Oct. 5, 2005, pp. 1.
Information Brokers of America, “Information Brokers of America Child Identity Theft Protection” http://web.archive.org/web/20080706135451/http://iboainfo.com/child-order.html as archived Jul. 6, 2008 in 1 page.
Information Brokers of America, “Safeguard Your Child's Credit”, http://web.archive.org/web/20071215210406/http://www.iboainfo.com/child-id-protect.html as archived Dec. 15, 2007 in 1 page.
“Intersections, Inc. Identity Guard”, from www.intersections.com and www.identityguard.com, as retrieved from Internet Archive, dated Nov. 25, 2005 or earlier; attached as “Identity Guard (IDG)”, pp. 7.
Iovation, Device Identification & Device Fingerprinting, http://www.iovation.com/risk-management/device-identification printed Nov. 5, 2012 in 6 pages.
Jacob et al., A Case Study of Checking Account Inquiries and Closures in Chicago, The Center for Financial Services Innovation, Nov. 2006.
Karlan et al., “Observing Unobservables:Identifying Information Asymmetries with a Consumer Credit Field Experiment”, Jun. 17, 2006, pp. 58, http://aida.econ.yale.edu/karlan/papers/ObservingUnobservables.KarlanZinman.pdf.
Khan, Muhammad Khurram, PhD., “An Efficient and Secure Remote Mutual Authentication Scheme with Smart Cards” IEEE International Symposium on Biometrics & Security Technologies (ISBAST), Apr. 23-24, 2008, pp. 1-6.
Lamons, Bob, “Be Smart: Offer Inquiry Qualification Services,” Marketing News, ABI/Inform Global, Nov. 6, 1995, vol. 29, No. 23, pp. 13.
Lee, Timothy B., “How America's Broken Tax System Makes Identity Theft Easy”, http://www.vox.com/2014/4/14/5608072/how-americas-broken-tax-system-makes-identity-theft-easy, Apr. 14, 2014, pp. 10.
Lee, W.A.; “Experian, on Deal Hunt, Nets Identity Theft Insurer”, American Banker: The Financial Services Daily, Jun. 4, 2003, New York, NY, 1 page.
Lefebvre et al., “A Robust Soft Hash Algorithm for Digital Image Signature”, International Conference on Image Processing 2:11 (ICIP), vol. 3, Oct. 2003, pp. 495-498.
LifeLock, “How LifeLock Works,” http://www.lifelock.com/lifelock-for-people printed Mar. 14, 2008 in 1 page.
LifeLock, “LifeLock Launches First ID Theft Prevention Program for the Protection of Children,” Press Release, Oct. 14, 2005, http://www.lifelock.com/about-us/press-room/2005-press-releases/lifelock-protection-for-children.
LifeLock; “How Can LifeLock Protect My Kids and Family?” http://www.lifelock.com/lifelock-for-people/how-we-do-it/how-can-lifelock-protect-my-kids-and-family printed Mar. 14, 2008 in 1 page.
LifeLock, “Personal Identity Theft Protection & Identity Theft Products,” http://www.lifelock.com/lifelock-for-people, accessed Nov. 5, 2007.
LifeLock, Various Pages, www.lifelock.com/, 2007.
My Call Credit http://www.mycallcredit.com/products.asp?product=ALR dated Dec. 10, 2005 on www.archive.org.
My Call Credit http://www.mycallcredit.com/rewrite.asp?display=faq dated Dec. 10, 2005 on www.archive.org.
MyReceipts, http://www.myreceipts.com/, printed Oct. 16, 2012 in 1 page.
MyReceipts—How it Works, http://www.myreceipts.com/howItWorks.do, printed Oct. 16, 2012 in 1 page.
National Alert Registry Launches RegisteredOffendersList.org to Provide Information on Registered Sex Offenders, May 16, 2005, pp. 2, http://www.prweb.com/printer/240437.htm accessed on Oct. 18, 2011.
National Alert Registry Offers Free Child Safety “Safe From Harm” DVD and Child Identification Kit, Oct. 24, 2006. pp. 2, http://www.prleap.com/pr/53170 accessed on Oct. 18, 2011.
National Alert Registry website titled, “Does a sexual offender live in your neighborhood”, Oct. 22, 2006, pp. 2, http://web.archive.org/wb/20061022204835/http://www.nationallertregistry.com/ accessed on Oct. 13, 2011.
OGG, Erica, “Apple Cracks Down on UDID Use”, http://gigaom.com/apple/apple-cracks-down-on-udid-use/ printed Nov. 5, 2012 in 5 Pages.
Organizing Maniac's Blog—Online Receipts Provided by MyQuickReceipts.com, http://organizingmaniacs.wordpress.com/2011/01/12/online-receipts-provided-by-myquickreceipts.com/ dated Jan. 12, 2011 printed Oct. 16, 2012 in 3 pages
Pagano, et al., “Information Sharing in Credit Markets,” Dec. 1993, The Journal of Finance, vol. 48, No. 5, pp. 1693-1718.
Partnoy, Frank, Rethinking Regulation of Credit Rating Agencies: An Institutional Investor Perspective, Council of Institutional Investors, Apr. 2009, pp. 21.
Planet Receipt—Home, http://www.planetreceipt.com/home printed Oct. 16, 2012 in 1 page.
Planet Receipt—Solutions & Features, http://www.planetreceipt.com/solutions-features printed Oct. 16, 2012 in 2 pages.
Press Release—“Helping Families Protect Against Identity Theft—Experian Announces FamilySecure.com; Parents and guardians are alerted for signs of potential identity theft for them and their children; product features an industry-leading $2 million guarantee”; PR Newswire; Irvine, CA; Oct. 1, 2007.
Privacy Rights Clearinghouse, “Identity Theft: What to do if it Happens to You,” http://web.archive.org/web/19990218180542/http://privacyrights.org/fs/fs17a.htm printed Feb. 18, 1999.
Quinn, Tom, “Low Credit Inquiries Affect Your Credit Score”, Credit.com, May 2, 2011, pp. 2.
Rivera, Barbara, “New Tools for Combating Income Tax Refund Fraud”, https://gcn.com/Articles/2014/05/08/Insight-tax-fraud-tools.aspx?Page=1, May 8, 2014, pp. 3.
Scholastic Inc.:Parent's Request for Information http://web.archive.org/web/20070210091055/http://www.scholastic.com/inforequest/index.htm as archived Feb. 10, 2007 in 1 page.
Scholastic Inc.:Privacy Policy http://web.archive.org/web/20070127214753/http://www.scholastic.com/privacy.htm as archived Jan. 27, 2007 in 3 pages.
ShoeBoxed, https://www.shoeboxed.com/sbx-home/ printed Oct. 16, 2012 in 4 pages.
Singletary, Michelle, “The Littlest Victims of ID Theft”, The Washington Post, The Color of Money, Oct. 4, 2007.
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, Retail Banker International, Jul. 24, 2007, pp. 4.
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, Experian: Decision Analytics, Dec. 18, 2007, pp. 24.
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, e-News, Experian: Decision Analytics, pp. 4, [Originally Published in Retail Banker International Magazine Jul. 24, 2007].
TheMorningCall.Com, “Cheap Ways to Foil Identity Theft,” www.mcall.com/business/columnists/all-karp.5920748jul01,0 . . . , published Jul. 1, 2007.
“TransUnion—Child Identity Theft Inquiry”, TransUnion, http://www.transunion.com/corporate/personal/fraudIdentityTheft/fraudPrevention/childIDInquiry.page as printed Nov. 5, 2009 in 4 pages.
Truston, “Checking if your Child is an ID Theft Victim can be Stressful,” as posted by Michelle Pastor on Jan. 22, 2007 at http://www.mytruston.com/blog/credit/checking_if_your_child_is_an_id_theft_vi.html.
Vamosi, Robert, “How to Handle ID Fraud's Youngest Victims,” Nov. 21, 2008, http://news.cnet.com/8301-10789_3-10105303-57.html.
Webpage printed out from http://www.jpmorgan.com/cm/ContentServer?c=TS_Content&pagename=jpmorgan%2fts%2FTS_Content%2FGeneral&cid=1139403950394 on Mar. 20, 2008, Feb. 13, 2006, New York, NY.
Wilson, Andrea, “Escaping the Alcatraz of Collections and Charge-Offs”, http://www.transactionworld.net/articles/2003/october/riskMgmt1.asp, Oct. 2003.
International Search Report and Written Opinion for Application No. PCT/US2007/06070, dated Nov. 10, 2008.
International Search Report and Written Opinion for Application No. PCT/US2008/064594, dated Oct. 30, 2008.
International Preliminary Report and Written Opinion in PCT/US2008/064594, dated Dec. 10, 2009.
International Search Report and Written Opinion for Application No. PCT/US09/37565, dated May 12, 2009.
Official Communication in Australian Patent Application No. 2012217565, dated May 12, 2017.
Official Communication in Canadian Patent Application No. 2,827,478, dated Jun. 29, 2017.
Official Communication in Canadian Patent Application No. 2,827,478, dated May 31, 2018.
Extended European Search Report for Application No. EP12747205, dated Sep. 25, 2014.
Supplementary European Search Report for Application No. EP12747205, dated Jun. 19, 2015.
International Search Report and Written Opinion for Application No. PCT/US2012/025456, dated May 21, 2012.
International Preliminary Report on Patentability in Application No. PCT/US2012/025456, dated Aug. 21, 2013.
International Search Report and Written Opinion for Application No. PCT/US2011/033940, dated Aug. 22, 2011.
Extended European Search Report for Application No. EP18207755, dated Dec. 13, 2018.
Official Communication in Canadian Patent Application No. 2,827,478, dated Mar. 27, 2019.
Official Communication in Australian Patent Application No. 2019279982, dated Dec. 19, 2019.
Provisional Applications (1)
Number Date Country
62586014 Nov 2017 US