A portion of the disclosure of this patent document includes material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyrights whatsoever.
The present disclosure generally relates to information security for tax filings in a computer environment.
In recent years, the number of third party, unwanted intrusions into private computing environments has continued to increase. These intrusions may come in a variety of forms, such as malicious third party systems attempting to emulate or impersonate the systems of a standard user. Such intrusions can be very disruptive and may, for example, immobilize operations, allow for the unauthorized access to sensitive data, or allow for the embezzlement of a user's account and corresponding funds.
Various systems and methods are disclosed which include features relating to security and identity verification systems and architectures to analyze and detect unauthorized third party intrusions and/or access.
The systems, methods, and devices of the disclosure each have several innovative aspects, no single one of which is solely responsible for the desirable attributes disclosed herein.
In one embodiment, a fraud detection and alert system is disclosed. The fraud detection and alert system may comprise: one or more data stores configured to store computer-executable instructions; a network interface configured to communicate with a plurality of network service devices; and one or more physical computer processors in communication with the one or more data stores, wherein the computer-executable instructions, when executed, configure the one or more processors to: receive, via the network interface, an electronic request for a filing of an application, wherein the electronic request is associated with a first user and includes user data associated with the first user; match, based on the electronic request, the user data associated with the first user to verification data stored in one or more searchable databases, wherein the verification data is associated with the first user; transmit notification to first user device associated with the first user regarding the successful application filing of the first user's application; receive an indication from the first user device indicating a possible fraudulent electronic request; determine, based on the indication, that the electronic request is fraudulent; and generate electronic instructions to stop the filing of the application as requested by the electronic requests.
In another embodiment, a computerized method for detecting fraudulent tax filings is disclosed. The computerized method may comprise: receiving, via a network interface, an electronic request for a filing of an application, wherein the electronic request is associated with a first user and includes user data associated with the first user; matching, based on the electronic request and using one or more computer processors, the user data associated with the first user to verification data stored in one or more searchable databases, wherein the verification data is associated with the first user; transmitting, via one or more computer processors, notification to first user device associated with the first user regarding the successful application filing of the first user's application; receiving, via a network interface, an indication from the first user device indicating a possible fraudulent electronic request; determining, via one or more computer processors, based on the indication, that the electronic request is fraudulent; and generating, via one or more computer processors, electronic instructions to stop the filing of the application as requested by the electronic request.
In a further embodiment, a non-transitory storage medium for storing instructions adapted to be executed by a processor to perform a method for automatically detecting fraudulent tax filings is disclosed. The instructions may comprise: receiving an electronic request for a filing of an application, wherein the electronic request is associated with a first user and includes user data associated with the first user; matching, based on the electronic request, the user data associated with the first user to verification data stored in one or more searchable databases, wherein the verification data is associated with the first user; transmitting notification to first user device associated with the first user regarding the successful application filing of the first user's application; receiving an indication from the first user device indicating a possible fraudulent electronic request; determining based on the indication, that the electronic request is fraudulent; and generating electronic instructions to stop the filing of the application as requested by the electronic request.
Although certain embodiments and examples are disclosed herein, the subject matter extends beyond the examples in the specifically disclosed embodiments to other alternative embodiments and/or uses, and to modifications and equivalents thereof.
Throughout the drawings, reference numbers are re-used to indicate correspondence between referenced elements. The drawings are provided to illustrate embodiments of the subject matter described herein and not to limit the scope thereof.
Although certain embodiments and examples are disclosed herein, the subject matter extends beyond the examples in the specifically disclosed embodiments to other alternative embodiments and/or uses, and to modifications and equivalents thereof.
A. Overview
Tax authorities such as a state or federal government continuously combat fraudulent activities such as noncompliance, evasion, identity theft and refund fraud. Unfortunately, despite widespread government crackdowns, fraudsters are finding new and creative ways to defraud the government and legitimate taxpayers. For example, some individuals and groups acquire personally identifiable information (PII) from the deceased, dumpster dive, hack financial systems, buy information from someone not filing a return or otherwise steal it from legitimate sources such as a doctor's office. This PII can then be used to fill out tax returns, add fraudulent income information, and request false deductions.
Fake returns and identity theft cause the government to lose billions of dollars. For example, during the first nine months of 2016, the Federal tax authority flagged roughly 787,000 fake returns claiming $4 billion in refunds, and 237,750 taxpayers filed affidavits saying they, too, were victims of tax identity theft. (See https://www.irs.gov/newsroom/irs-security-summit-partners-expand-identity-theft-safeguards-for-2017-filing-season-build-on-2016-successes). According to a May 2014 Governing Institute research study of 129 state and local government officials, 43 percent of respondents cited identity theft as the biggest challenge their agency faces regarding tax return fraud. Nationwide, stealing identities and filing for tax refunds is one of the fastest-growing nonviolent criminal activities. Although federal agencies and some states have been able to start reducing identity theft tax refund fraud for individuals, tax refund fraud involving businesses is on the rise. These activities burden government agencies and rob taxpayers by preventing returns from reaching the right people. Clearly, tax fraud through identity theft is still a major issue facing the tax authorities and taxpayers.
Most recently in a June 2017 report by the Electronic Tax Administration Advisory Committee (ETAAC) published by the Internal Revenue Service (IRS), Identity Theft Tax Refund Fraud (IDTTRF) was described as a tough problem for tax authorities to solve. The report went further to say that criminals are incentivized by the potential availability of billions of dollars in refunds, particularly driven by refundable tax credits intended to help low and moderate-income Americans. The criminals are smart, nimble, motivated and well-funded.
Tax collection agencies, such as tax authorities at the local, state, and federal level, combined continue to lose billions of dollars in tax refund fraud. Tax service providers (TSPs), such as the tax collection agencies or a private tax preparation organization such as Intuit, H&R Block, or other tax preparation business, are well-aware of the magnitude of the tax fraud problem. However, budgetary constraints and legal mandates have created a system that is often unable to follow up on the red flags until after a refund check has been sent. In addition, the consumer or customers' identities and ability to receive a timely return may be put at risk in the process. Some TSPs continue to expand filters used to detect identity theft tax refund fraud. Tax returns identified by these filters can be held during processing until the TSPs can verify the taxpayers' identities. This filtering approach, however, is problematic because it focuses only on fraud detection rather than proactively informing a tax payer of a tax filing to enable prevention. Further, as tax-refund fraud has soared and hit a whopping $21 billion in 2016, up from just $6.5 billion two years ago, the problem of tax-refund fraud is growing quickly and is compounded by an outdated fraud-detection system that has trouble identifying many attempts to trick it. Although federal agencies and some states have been able to start reducing identity theft tax refund fraud for individuals, tax refund fraud involving businesses is on the rise.
Security practices can have a significant impact on the tax experience and taxpayer behavior. Improving the taxpayer experience may require sustained creativity and focus for a TSP to build systems that are both secure and, conversely, easy to access and use from a taxpayer perspective. A system that is secure, but that few can use, may not be successful for a TSP as it expands some of its key online services. Thus, in some embodiments, a TSP may strive to achieve a situation where services are both secure and easy to use and access. For example, a TSP may benefit from a system that provides more intelligent and customizable fraud detection checks to inform the TSP, before a refund check is processed and mailed out or sent to a direct deposit account, that a tax transaction is at risk of being fraudulent, and/or provides multiple channels to notify their tax payers or customers proactively of both legitimate and fraudulent returns. Further, consumers may also benefit from a system which can: preemptively notify them that tax forms have been filed with their tax identifier (ID) or their business' tax ID regardless of whether they have been flagged as a potential fraudulent tax filing; provide a channel via online or through call centers to contact the IRS or its proxy to remediate the issue if they believe the tax filing is fraudulent; and/or provide a system to track the progress of their cases.
To provide an improved computer system for detecting and alerting tax frauds, embodiments of a security and identity verification system or tax fraud alert system described herein promotes a more proactive and interactive relationship between the taxpayer and government employees to improve taxpayer service, enforcement and operations. Instead of the typical approach of trying to enhance detection of fraudulent tax form submissions, this solution aims to send positive notifications to tax payers when their tax return is filed and/or when any tax form is filed using the tax payers' individual tax ID or business tax ID(s). In some embodiments, the solution can leverage data from one or more credit bureaus and other data sources and algorithms to find good or even the best contact information for a tax payer and send the tax alerts. In some embodiments, the solution can also leverage other software suites and call centers to handle callbacks from users that received a tax alert and suspect fraud or have questions.
As an example, in some embodiments, a portion of the tax fraud alert system can be run at data centers of a tax authority if the tax authority's integration model does not allow non-public personal information (NPPI) data from tax forms to leave their premises, or where the some or all portions of the NPPI data can leave the premise, the system can offer a set of Application Programming Interfaces (APIs)/batch processes to send a subset of NPPI data from tax forms to another entity for the system to determine the correct identity(ies) tied to the individual tax ID or business tax ID in the tax form, selecting contact information to send the tax alert, and/or for handling customer support for those that receive a tax alert. While processing the NPPI submitted, in some embodiments, the system may also perform various types of fraud checks. Some example fraud checks can include: SSN check, multiple submissions to the same address (velocity of the same address being used), multiple submissions to the same bank account, verify against deceased records, communication checks (email, phone numbers, residential address), checking NPPI data in the tax filing against the credit bureau data to look for discrepancies and to verify communication channels, and/or a combination of positive activity tax alerts to all consumers or customers filing taxes and customizable fraud checks.
By notifying the taxpayer that their identity, tax ID, or business tax ID has been used to file a tax form, the consumer can respond to tax authorities and stop the process if they have not submitted a tax form. This proactive communication can prevent loss of tax refunds associated with identity fraud, significantly reduce fraudulent or unauthorized individual or business tax filings whether a refund is involved or not, and alert taxpayers to possible identity theft. In addition, in the June 2017 Electronic Tax Administration Advisory Committee (ETAAC) report published by IRS, the committee cited among its principal recommendations in addressing identity based tax fraud the need to improve authentication practices, including using innovative pilots and finding a replacement solution for the outmoded 2016 AGI/PIN e-file signature verification.
As further described herein, embodiments of the tax fraud alert system can use Personally Identifiable Information (PII) to verify a taxpayer's identity. For example, the PII used on the tax filing can be verified as belonging to the legitimate taxpayer through an independent verification process. Once the legitimate taxpayer is located, the most recent contact information including landline or mobile phone number, mailing address, and/or email associated with the legitimate taxpayer can be sent an alert notifying the taxpayer that a tax return has been filed with the taxpayer's credentials. If the legitimate taxpayer has not submitted a filing, the taxpayer can be provided with an option to contact the tax authority's customer service center or visit a web portal to get more information, and if necessary initiate a dispute and potentially stop payment of any tax refunds tied to the tax filing. The tax fraud alert system can offer a branded call center and/or a branded web portal to handle customers' or tax payers' inquiries about the tax alerts.
In some embodiments, the function of the tax fraud alert system can be twofold—(1) the successful delivery of the tax alert can serve to confirm the legitimate tax payer has filed the return and/or (2) the verification process ensures delivery of alerts to the legitimate taxpayer which results in additional information that can be useful in the overall review of the tax filing. TSP can be provided with a result from the taxpayer verification process, such as, for example, no taxpayer verified through information provided, taxpayer found to be deceased, or taxpayer/location found to be prison. One or more of these results may allow a tax authority to take next steps in the return evaluation process independent of taxpayer response to alerts or content of alerts generated.
Advantageously, in some embodiments, the alert does not add any additional time for processing, but may even shorten the time for processing because if a legitimate taxpayer receives the alert and notifies a tax authority that the taxpayer did not submit the tax filing in question, the tax filing can be sent immediately to fraud prevention for further evaluation. Unlike some existing tax fraud prevention efforts requiring the taxpayer to first obtain a PIN from the TSP to submit it in a tax form, in some embodiments, this tax fraud alert system does not require any taxpayer interaction to be in effect. The legitimate taxpayer does not have to opt-in in order to receive a notification that a tax form has been filed using tax ID or business tax ID that belongs to him or her.
In some embodiments, before sending a taxpayer filing alert, another entity (such as, for example, a credit bureau) can independently verify identity of the taxpayer, and independently locate and verify a mobile phone and/or other contact information associated with the legitimate taxpayer and/or find the best mobile phone number and other contact information. In some embodiments, alerts may only be sent if both the taxpayer and contact information can be verified. If taxpayer receiving the tax alert has submitted a tax form in his or her name or on behalf of a business, then he or she does not have to take any action. The majority of alerts may serve as a notification with no action required. If the taxpayer has not filed any tax form, the taxpayer can be provided with a call center number to contact for remediation efforts. The alerting process, while largely frictionless to the taxpayer, becomes an indispensable, proactive tool in combatting identity theft tax return fraud at the onset.
The security and identity verification system 100 may include multiple third party system 110 which communicate with the tax fraud alert system 120, such as to submit data, provide information on filed tax returns, and receive alerts for possible tax filing fraud. In some embodiments the third party systems 110 may include TSP systems (for example, systems of the US Federal Government, systems of state governments), third party vendor systems, third party data provider systems, and/or other third party systems. The third party systems 110 may be implemented using a variety of devices including, for example, personal computers, servers, tablets, smart phones, smart watches, car consoles, or the like, alone or in combination. The exemplary third party systems 110 include computer hardware and/or software that allows the devices to communicate with the tax alert fraud system 120 as well as one or more of the tax payer/tax filer systems 130 via the communications network 140. The tax fraud alert systems 120 may include a portal or other software or code that allows the TSP systems 110 to provide configurations for how the respective TSP system 110 would like to configure its alerts. The tax alert fraud systems 120 may be partitioned such that one TSP system 110 and its private configurations are not accessible to or viewable by another TSP system 110.
The security and identity verification system 100 may include multiple tax payer/tax filer systems 130 which are utilized by tax filers to, among other things, provide tax submissions, receive tax alerts, and/or review refund status. The tax payer/tax filer systems 130 may be implemented using a variety of devices including, for example, personal computers, servers, tablets, smart phones, smart watches, car consoles, or the like, alone or in combination. The exemplary tax payer/tax filer systems 130 include computer hardware and/or software that allows the devices to communicate with the tax alert fraud system 120 as well as one or more of the third party systems 110, such as a tax service provider via the communications networks 140. To simplify discussion, but without limiting the present disclosure,
In some embodiments, the communications network 140 comprises one or more of local area network (LAN), wide area network (WAN), and/or the Internet, for example, via a wired, wireless, or combination of wired and wireless communication links. The communications network 140 may communicate with various computing devices and/or other electronic devices via wired or wireless communication links. The communications network 140 may be used to share resources and may be used for the analog and/or digital transfer of data and information. In some embodiments, the communications network 140 can be used to enable multiple devices access to a single system, enable file sharing across the communications network 140, share software programs on remote systems, or make information easier to access and maintain among network users.
It is recognized that the term “remote” may include data, objects, devices, components, and/or modules not stored locally, that are not accessible via the local bus. Thus, remote devices may include a device which is physically stored in the same room and connected to the user's device via a network. In other situations, a remote device may be located in a separate geographic area, such as, for example, in a different location, country, and so forth.
B. Tax Fraud Alert System
In some embodiments, the tax fraud alert system 120 can include three sub-systems in
In some embodiments, the output of the tax fraud alert system 120 can include one or more of the following options. The first option may include a tax alert to each tax filer based on the results of the IVE 122 and/or the BCE 124. The second option may include a tax alert to identity submitted in the original tax form if the optional IVE 122 and BCE 124 processes were not chosen or if the IVE 122 and/or the BCE 124 were unable to verify a different identity or different contact information than what was submitted in the tax form. This option can still be useful to stop cases where the thief uses the correct information of the tax filer and only changes the account information to be used for tax refunds. The TSP may also use this option to test the notification process and the remediation process for users that receive the notifications. The third option may include a tax fraud alert to the associated TSP with all records that have been flagged by the IVE 122 and the BCE 124. This option can be used by the TSP to initiate fraud investigations on flagged records.
Upon receipt of the tax alert via SMS, email, and/or direct mail, in some embodiments the tax filer may be given detailed instructions on whom to contact to remediate the issue in the event the tax filers believe a tax form was fraudulently filed in the tax filer's name or the name of the tax filer's business. In some embodiments, the tax filer may be automatically redirected to a remediation server which can provide automated remediation processes to assist the tax filer. During this remediation process, in some embodiments, a tax fraud alert can be sent to the associated TSP to halt any tax refund in process and to initiate a fraud review of the tax form, such as via a warm transfer or other transfer or data.
In some embodiments, the tax alert comprises one or more encrypted data packets which stores information about the tax alert and is configured to be sent over an electronic communications network, such as the Internet.
C. Tax Fraud Alert System Processes
For example, in
In some embodiments, the security platform or backend system (for example a tax notification system) can send the taxpayer other notices throughout the tax processing life cycle if a TSP selects this notification option. For example, as illustrated in
The tax fraud alert system 120 may receive the tax filing data via the API or the batch process. If the TSP has requested notification of such errors, the tax fraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the tax fraud alert system 120 may perform a verification process, such as, for example, the identity verification process described in
The tax fraud alert system 120 and/or the remote call center system or portal, may generate and send an electronic notification indicating whether there is possible fraud associated with the tax payer's corresponding filing. If so, then the tax fraud alert system 120 may generate and send a notification to the TSP system 110 that the tax payer has confirmed the filing. If not, then the tax fraud alert system 120 may generate and send a notification to the TSP system 110 a possible fraud notice. In some embodiments, such notice may include instructions or an indication that is used by the TSP to stop or cancel a refund request. Such notifications may be sent to the TSP system 110 via a secure protocol, such as, for example, HTTPS, SFTP, or another secure protocol.
The TSP system 110 receives the notification and determine whether there is possible fraud using the notification. If so, the TSP system 110 may generate instruction to stop or cancel any refund processing and/or to initiate an investigation of the potential fraud. If not, then the TSP system 110 may resume with its normal tax processing. The TSP system may determine whether there is possible fraud based solely on the notification, based in part on the notification, and/or based on its own independent analysis of the tax payer filing. If the investigation determines that there is no fraud, then the TSP system 110 may resume with its normal tax processing.
The tax fraud alert system 120 may receive the tax filing data via the API or the batch process. If the TSP has requested notification of such errors, the tax fraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the tax fraud alert system 120 may perform a verification process, such as, for example, the identity verification process described in
In (2), the TSP system 110 processes the tax form. If there is an indication that the TSP system 110 should send a notice or alert about the tax filing, then the TSP system 110 may make a call to the tax fraud alert system 120, such as, for example via an API or by adding the tax payer's record to a batch file for processing. The communication may be made via a secure communication protocol, such as, for example, HTTPS, SFTP, or another secure protocol. The indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification.
The tax fraud alert system 120 may receive the taxes processed data via the API or the batch process. If the TSP has requested notification of such errors, the tax fraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the tax fraud alert system 120 may generate and send a notification or alert to the tax payer that the taxes have been processed, such as, for example, using one or more of the contact channels determined by the contact process, for example using the alert notification process described in
If there is a pending refund, then in (3), the TSP processes the refund. If there is an indication that the TSP system 110 should send a notice or alert about the refund, then the TSP system 110 may make a call to the tax fraud alert system 120, such as, for example via an API or by adding the tax payer's record to a batch file for processing. The communication may be made via a secure communication protocol, such as, for example, HTTPS, SFTP, or another secure protocol. The indication may be based on the tax payer requesting a notification and/or the TSP or other system indicating that the tax payer should receive a notification.
The tax fraud alert system 120 may receive the refund data via the API or the batch process. If the TSP has requested notification of such errors, the tax fraud alert system 120 may send a notice to the TSP system indicating that there are and/or are not any input errors. This notice may include the information on one or more tax payer files. If there are no errors, the tax fraud alert system 120 may generate and send a notification or alert to the tax payer that the refund has been sent, such as, for example, using one or more of the contact channels determined by the contact process, for example using the alert notification process described in
As another example, in
As another example, in
The fraud alert system, upon receiving tax filer's records, can analyze the data in the tax filer's records and send results to an alert notification engine. The alert notification engine can notify the tax filer (or another entity if the tax filer is using the other entity's identity) of the tax submission and/or notify the TSP system 110 of the potential fraud risk. The notification to the tax filer can indicate that a tax form has been filed using the entity's tax ID.
It is recognized that
D. Tax Fraud Alert System Components
The illustrated embodiments of
1. Identity Verification Engine (IVE)
In the illustrated embodiments of
In some embodiments, some example features of the IVE 122 can include one or more of the following:
Different or additional sources may also be used for this service depending on the inputs provided by the TSP and the TSP preferences for how to handle identify verification.
Special Handling Matching Rules for Identity Verification Engine
In some embodiments, the IVE 122 can include configurable rules. Some example scenarios and configurations are described in the table below.
2. Best Contact Engine (BCE)
In the illustrated embodiments of
The types of information and software services that can be executed together with the BCE 124 for locating the contact information can include one or more of the following:
Different or additional sources may also be used for this service depending on the inputs provided by the TSP and the TSP preferences for how to handle matching ambiguities.
3. Alert Notification Engine (ANE)
In the illustrated embodiments of
In some embodiments, distribution channels provide TSP several options for sending the alert to the tax filer. Some example distribution channels include:
In some embodiments, distribution schedule may be appropriate to handle large volumes. For example, the alert notification engine can avoid sending a volume of notifications at once that would result in an inquiry volume that could not be supported by the call centers.
In some embodiments, the notification may follow one or more templates which may be approved by TSPs. Selection of appropriate templates depending on TSP preferences, notification channel (for example, the template for text messages would be different than the template for emails), and PII available for a tax filer. Parameter substitution for notification templates including ways for tax payers or tax filers to authenticate that the tax alert notice is legitimate. Some examples of how to show legitimacy of the alert include one or more of:
In some embodiments, each tax alert sent can include a unique identifier that can be used by the user when contacting the branded call center, reaching the branded web portal to handle tax alert inquiries, and/or when calling the TSP directly to inquire about the alert or to dispute the tax filing.
4. Alert Notification Support and Remediation via Portal and Call Center
As part of this solution, in some embodiments, the tax fraud alert system 120 can offer TSPs multiple options to support the tax filers that receive the tax alert notification. The alert itself can include the appropriate calls to action for the filer in accordance with the option(s) the TSP selected for offering alert notification support. Some examples of alert notification support can include one or more of:
In some embodiments, the TSP can also choose which functions may be offered by the call center or the web portal as applicable if TSP chooses to have another entity to host the call center or the web portal. Some example functions can include one or more of:
For some options, such as, for example, the last two options (initiating a dispute of a tax filing and stopping payment of a refund), TSP may choose to have the host (of the call center and/or web portal) to either escalate handling of disputes and/or stop payments on refunds, or the TSP may offer a web service that allows the host to initiate a dispute programmatically via either the web portal and/or an administrative tool available to the call center staff.
5. Call Center Support
In the illustrated embodiments of
In the illustrated embodiments of
In both scenarios, next the TSP may investigate the submission and cancel the fraudulent return or puts the return on hold. The TSP contacts the user and provides them a code to file their real tax return when ready. In some embodiments, this could be a notification from the backend (for example, the tax fraud alert system 120) which may pass the status of the investigation to the backend with a tax submission code. It is recognized that some TSPs may have a process for generating unique IDs for victims of identity theft. This ID may be entered to file a tax return and may be already integrated into the TSP. This could be used when the user is ready to submit their real return.
It is recognized that one or more of the TSPs may use a different process and so the embodiments of
In some embodiments, the host's databases (or other databases) may be used to implement one or more of the following functions related to call center support:
6. Web Portal Support
In the illustrated embodiments of
The portal can have automated ways or static content that address one or more of the following functions:
It is recognized that white labeling services may be provided allowing one or more tax filer facing systems to be branded with one entity and one or more backend processes or services to be run by an entity other than the entity associated with the branding. In such case, the white labeling services may be hosted by the backend processes and/or a system of the entity associated with the branding.
7. Dispute Process
The TSP can establish manual or automated processes that allow the tax fraud alert system 120 to perform one or more of the following:
In some embodiments, the tax fraud alert system 120 also includes one or more components and processes to provide automated configuration services for the other systems, such as the TSP systems, third party vendors, or third party data suppliers. The configuration may be provided via a remotely accessible portal that allows a user of a third party system to access the portal, review the options for configuration, provide electronic indications of the selected options, and instruct the portal to store the options. Prior to launching the tax fraud alert system 120, the TSP can configure one or more of the following options:
In some embodiments, the TSP may be offered configurable options for what information to share and how to share it. Some features in this solution can only be available if certain optional inputs are provided. For example, the ability to present to the end user dollar amounts specific to their tax filing as a way for the user to gain confidence that the notification is legitimate would only be possible if the TSP is willing to provide such dollar amounts for use in this solution. Omission of optional PII might reduce the efficacy of the service or render some features unavailable.
In some embodiments, the PII submitted can be expected to be what the tax filer provided in the tax form filing and does not necessarily have to be verified by the TSP before submitting the PII to the service. Examples of submitted PII may include one or more of the following:
Typically, the components of the processing system 600 are connected using a standards-based bus system 624. In different embodiments, the standards-based bus system 624 could be implemented in Peripheral Component Interconnect (PCI), Microchannel, Small Computer System Interface (SCSI), Industrial Standard Architecture (ISA) and Extended ISA (EISA) architectures, for example. In addition, the functionality provided for in the components and modules of processing system 600 may be combined into fewer components and modules or further separated into additional components and modules.
The processing system 600 is generally controlled and coordinated by operating system software, such as Windows XP, Windows Vista, Windows 7, Windows 8, Windows 10, Windows Server, Unix, Linux, SunOS, Solaris, iOS, MAC OS X, Blackberry OS, Android, or other operating systems. In other embodiments, the processing system 600 may be controlled by a proprietary operating system. The operating system is configured to control and schedule computer processes for execution, perform memory management, provide file system, networking, I/O services, and provide a user interface, such as a graphical user interface (GUI), among other things. The GUI may include an application interface and/or a web-based interface including data fields for receiving input signals or providing electronic information and/or for providing information to the user in response to any received input signals. A GUI may be implemented in whole or in part using technologies such as HTML, Flash, Java, .net, web services, and RSS. In some implementations, a GUI may be included in a stand-alone client (for example, thick client, fat client) configured to communicate (for example, send or receive data) in accordance with one or more of the aspects described.
The processing system 600 may include one or more commonly available input/output (I/O) devices and interfaces 615, such as a keyboard, stylus, touch screen, mouse, touchpad, and printer. In one embodiment, the I/O devices and interfaces 615 include one or more display devices, such as a monitor, that allows the visual presentation of data to a user. More particularly, a display device provides for the presentation of GUIs, application software data, and multimedia presentations, for example. The processing system 600 may also include one or more multimedia devices 606, such as speakers, video cards, graphics accelerators, and microphones, for example.
In the embodiment of
In some embodiments, information may be provided to the processing system 600 over a network from one or more data sources. The data sources may include one or more internal and/or external data sources. In some embodiments, one or more of the databases or data sources may be implemented using a relational database, such as Sybase, Oracle, CodeBase and Microsoft® SQL Server as well as other types of databases such as, for example, a flat file database, a non-relational database, an entity-relationship database, and object-oriented database, and/or a record-based database.
In general, the word “module,” as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, possibly having entry and exit points, written in a programming language, such as, for example, Java, Lua, C, or C++. A software module may be compiled and linked into an executable program, installed in a dynamic link library, or may be written in an interpreted programming language such as, for example, BASIC, Perl, or Python. It will be appreciated that software modules may be callable from other modules or from themselves, and/or may be invoked in response to detected events or interrupts. Software modules configured for execution on computing devices may be provided on a computer readable medium, such as a compact disc, digital video disc, flash drive, or any other tangible medium. Such software code may be stored, partially or fully, on a memory device of the executing computing device, such as the processing system 600, for execution by the computing device. Software instructions may be embedded in firmware, such as an EPROM. It will be further appreciated that hardware modules may be comprised of connected logic units, such as gates and flip-flops, and/or may be comprised of programmable units, such as programmable gate arrays or processors. The modules described herein are preferably implemented as software modules. They may be represented in hardware or firmware. Generally, the modules described herein refer to logical modules that may be combined with other modules or divided into sub-modules despite their physical organization or storage.
In the example of
It is to be understood that not necessarily all objects or advantages may be achieved in accordance with any particular embodiment described herein. Thus, for example, those skilled in the art will recognize that certain embodiments may be configured to operate in a manner that achieves or optimizes one advantage or group of advantages as taught herein without necessarily achieving other objects or advantages as may be taught or suggested herein.
All of the processes described herein may be embodied in, and fully automated, via software code modules executed by a computing system that includes one or more computers or processors. In some embodiments, at least some of the processes may be implemented using virtualization techniques such as, for example, cloud computing, application containerization, or Lambda architecture, so on, alone or in combination. The code modules may be stored in any type of non-transitory computer-readable medium or other computer storage device. Some or all the methods may be embodied in specialized computer hardware.
Many other variations than those described herein will be apparent from this disclosure. For example, depending on the embodiment, certain acts, events, or functions of any of the algorithms described herein can be performed in a different sequence or can be added, merged, or left out altogether (for example, not all described acts or events are necessary for the practice of the algorithms). Moreover, in certain embodiments, acts or events can be performed concurrently, for example, through multi-threaded processing, interrupt processing, or multiple processors or processor cores or on other parallel architectures, rather than sequentially. In addition, different tasks or processes can be performed by different machines and/or computing systems that can function together.
The various illustrative logical blocks and modules described in connection with the embodiments disclosed herein can be implemented or performed by a machine, such as a virtual machine, a processing unit or processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A processor can be a microprocessor, but in the alternative, the processor can be a controller, microcontroller, or state machine, combinations of the same, or the like. A processor can include electrical circuitry configured to process computer-executable instructions. In another embodiment, a processor includes an FPGA or other programmable device that performs logic operations without processing computer-executable instructions. A processor can also be implemented as a combination of computing devices, for example, a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Although described herein primarily with respect to digital technology, a processor may also include primarily analog components. For example, some or all of the signal processing algorithms described herein may be implemented in analog circuitry or mixed analog and digital circuitry. A computing environment can include any type of computer system, including, but not limited to, a computer system based on a microprocessor, a mainframe computer, a digital signal processor, a portable computing device, a device controller, or a computational engine within an appliance, to name a few.
Conditional language such as, among others, “can,” “could,” “might” or “may,” unless specifically stated otherwise, are understood within the context as used in general to convey that certain embodiments include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without user input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment.
Disjunctive language such as the phrase “at least one of X, Y, or Z,” unless specifically stated otherwise, is understood with the context as used in general to present that an item, term, etc., may be either X, Y, or Z, or any combination thereof (for example, X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
Any process descriptions, elements or blocks in the flow diagrams described herein and/or depicted in the attached figures should be understood as potentially representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or elements in the process. Alternate implementations are included within the scope of the embodiments described herein in which elements or functions may be deleted, executed out of order from that shown, or discussed, including substantially concurrently or in reverse order, depending on the functionality involved as would be understood by those skilled in the art.
Unless otherwise explicitly stated, articles such as “a” or “an” should generally be interpreted to include one or more described items. Accordingly, phrases such as “a device configured to” are intended to include one or more recited devices. Such one or more recited devices can also be collectively configured to carry out the stated recitations. For example, “a processor configured to carry out recitations A, B and C” can include a first processor configured to carry out recitation A working in conjunction with a second processor configured to carry out recitations B and C.
It should be emphasized that many variations and modifications may be made to the above-described embodiments, the elements of which are to be understood as being among other acceptable examples. All such modifications and variations are intended to be included herein within the scope of this disclosure.
This application claims the benefit of priority of U.S. Provisional Patent Application Ser. No. 62/586,014, filed Nov. 14, 2017, the entirety of which is hereby incorporated herein by reference for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
2074513 | Mills | Mar 1937 | A |
3316395 | Lavin et al. | Apr 1967 | A |
3752904 | Waterbury | Aug 1973 | A |
4163290 | Sutherlin et al. | Jul 1979 | A |
5274547 | Zoffel et al. | Dec 1993 | A |
5323315 | Highbloom | Jun 1994 | A |
5414833 | Hershey et al. | May 1995 | A |
5454030 | de Oliveira et al. | Sep 1995 | A |
5504675 | Cragun et al. | Apr 1996 | A |
5563783 | Stolfo et al. | Oct 1996 | A |
5627886 | Bowman | May 1997 | A |
5679940 | Templeton et al. | Oct 1997 | A |
5696907 | Tom | Dec 1997 | A |
5696965 | Dedrick | Dec 1997 | A |
5739512 | Tognazzini | Apr 1998 | A |
5742775 | King | Apr 1998 | A |
5745654 | Titan | Apr 1998 | A |
5752242 | Havens | May 1998 | A |
5754632 | Smith | May 1998 | A |
5774868 | Cragun et al. | Jun 1998 | A |
5809478 | Greco et al. | Sep 1998 | A |
5819226 | Gopinathan et al. | Oct 1998 | A |
5819260 | Lu et al. | Oct 1998 | A |
5822741 | Fischthal | Oct 1998 | A |
5832068 | Smith | Nov 1998 | A |
5842178 | Giovannoli | Nov 1998 | A |
5870721 | Norris | Feb 1999 | A |
5872921 | Zahariev et al. | Feb 1999 | A |
5878403 | DeFrancesco | Mar 1999 | A |
5879297 | Haynor et al. | Mar 1999 | A |
5884289 | Anderson et al. | Mar 1999 | A |
5912839 | Ovshinsky et al. | Jun 1999 | A |
5913196 | Talmor et al. | Jun 1999 | A |
5943666 | Kleewein et al. | Aug 1999 | A |
5950179 | Buchanan et al. | Sep 1999 | A |
5987440 | O'Neil et al. | Nov 1999 | A |
5999907 | Donner | Dec 1999 | A |
5999940 | Ranger | Dec 1999 | A |
6023694 | Kouchi et al. | Feb 2000 | A |
6029139 | Cunningham et al. | Feb 2000 | A |
6029149 | Dykstra et al. | Feb 2000 | A |
6029154 | Pettitt | Feb 2000 | A |
6029194 | Tilt | Feb 2000 | A |
6044357 | Garg | Mar 2000 | A |
6055570 | Nielsen | Apr 2000 | A |
6094643 | Anderson et al. | Jul 2000 | A |
6119103 | Basch et al. | Sep 2000 | A |
6125985 | Amdahl et al. | Oct 2000 | A |
6142283 | Amdahl et al. | Nov 2000 | A |
6144988 | Kappel | Nov 2000 | A |
6157707 | Baulier et al. | Dec 2000 | A |
6182219 | Feldbau et al. | Jan 2001 | B1 |
6208720 | Curtis et al. | Mar 2001 | B1 |
6249228 | Shirk et al. | Jun 2001 | B1 |
6253203 | O'Flaherty et al. | Jun 2001 | B1 |
6254000 | Degen et al. | Jul 2001 | B1 |
6263447 | French et al. | Jul 2001 | B1 |
6269349 | Aieta et al. | Jul 2001 | B1 |
6282658 | French et al. | Aug 2001 | B2 |
6285983 | Jenkins | Sep 2001 | B1 |
6285987 | Roth et al. | Sep 2001 | B1 |
6292795 | Peters et al. | Sep 2001 | B1 |
6311169 | Duhon | Oct 2001 | B2 |
6317783 | Freishtat et al. | Nov 2001 | B1 |
6321339 | French et al. | Nov 2001 | B1 |
6330546 | Gopinathan et al. | Dec 2001 | B1 |
6397197 | Gindlesperger | May 2002 | B1 |
6418436 | Degen et al. | Jul 2002 | B1 |
6424956 | Werbos | Jul 2002 | B1 |
6448889 | Hudson | Sep 2002 | B1 |
6456984 | Demoff et al. | Sep 2002 | B1 |
6496936 | French et al. | Dec 2002 | B1 |
6505193 | Musgrave et al. | Jan 2003 | B1 |
6510415 | Talmor et al. | Jan 2003 | B1 |
6513018 | Culhane | Jan 2003 | B1 |
6532459 | Berson | Mar 2003 | B1 |
6542894 | Lee et al. | Apr 2003 | B1 |
6543683 | Hoffman | Apr 2003 | B2 |
6553495 | Johansson et al. | Apr 2003 | B1 |
6571334 | Feldbau et al. | May 2003 | B1 |
6597775 | Lawyer et al. | Jul 2003 | B2 |
6612488 | Suzuki | Sep 2003 | B2 |
6615193 | Kingdon et al. | Sep 2003 | B1 |
6658393 | Basch et al. | Dec 2003 | B1 |
6700220 | Bayeur et al. | Mar 2004 | B2 |
6714918 | Hillmer et al. | Mar 2004 | B2 |
6735572 | Landesmann | May 2004 | B2 |
6740875 | Ishikawa et al. | May 2004 | B1 |
6748426 | Shaffer et al. | Jun 2004 | B1 |
6751626 | Brown et al. | Jun 2004 | B2 |
6796497 | Benkert et al. | Sep 2004 | B2 |
6811082 | Wong | Nov 2004 | B2 |
6829711 | Kwok et al. | Dec 2004 | B1 |
6850606 | Lawyer et al. | Feb 2005 | B2 |
6857073 | French et al. | Feb 2005 | B2 |
6866586 | Oberberger et al. | Mar 2005 | B2 |
6871287 | Ellingson | Mar 2005 | B1 |
6873979 | Fishman et al. | Mar 2005 | B2 |
6898574 | Regan | May 2005 | B1 |
6907408 | Angel | Jun 2005 | B2 |
6908030 | Rajasekaran et al. | Jun 2005 | B2 |
6913194 | Suzuki | Jul 2005 | B2 |
6918038 | Smith et al. | Jul 2005 | B1 |
6920435 | Hoffman et al. | Jul 2005 | B2 |
6928546 | Nanavati et al. | Aug 2005 | B1 |
6930707 | Bates et al. | Aug 2005 | B2 |
6934849 | Kramer et al. | Aug 2005 | B2 |
6934858 | Woodhill | Aug 2005 | B2 |
6965881 | Brickell et al. | Nov 2005 | B1 |
6965997 | Dutta | Nov 2005 | B2 |
6973462 | Dattero et al. | Dec 2005 | B2 |
6973575 | Arnold | Dec 2005 | B2 |
6983381 | Jerdonek | Jan 2006 | B2 |
6983882 | Cassone | Jan 2006 | B2 |
6991174 | Zuili | Jan 2006 | B2 |
6993659 | Milgramm et al. | Jan 2006 | B2 |
7007174 | Wheeler et al. | Feb 2006 | B2 |
7028052 | Chapman et al. | Apr 2006 | B2 |
7035855 | Kilger et al. | Apr 2006 | B1 |
7069240 | Spero et al. | Jun 2006 | B2 |
7083090 | Zuili | Aug 2006 | B2 |
7089592 | Adjaoute et al. | Aug 2006 | B2 |
7092891 | Maus et al. | Aug 2006 | B2 |
7104444 | Suzuki | Sep 2006 | B2 |
7158622 | Lawyer et al. | Jan 2007 | B2 |
7162640 | Heath et al. | Jan 2007 | B2 |
7174335 | Kameda | Feb 2007 | B2 |
7188078 | Arnett et al. | Mar 2007 | B2 |
7203653 | McIntosh | Apr 2007 | B1 |
7212995 | Schulkins | May 2007 | B2 |
7222779 | Pineda-Sanchez et al. | May 2007 | B1 |
7225977 | Davis | Jun 2007 | B2 |
7234156 | French et al. | Jun 2007 | B2 |
7240059 | Bayliss et al. | Jul 2007 | B2 |
7240363 | Ellingson | Jul 2007 | B1 |
7246067 | Austin et al. | Jul 2007 | B2 |
7246740 | Swift et al. | Jul 2007 | B2 |
7254560 | Singhal | Aug 2007 | B2 |
7263506 | Lee et al. | Aug 2007 | B2 |
7272728 | Pierson et al. | Sep 2007 | B2 |
7272857 | Everhart | Sep 2007 | B1 |
7277869 | Starkman | Oct 2007 | B2 |
7277875 | Serrano-Morales et al. | Oct 2007 | B2 |
7283974 | Katz et al. | Oct 2007 | B2 |
7289607 | Bhargava et al. | Oct 2007 | B2 |
7290704 | Ball et al. | Nov 2007 | B1 |
7298873 | Miller, Jr. et al. | Nov 2007 | B2 |
7310743 | Gagne et al. | Dec 2007 | B1 |
7314162 | Carr et al. | Jan 2008 | B2 |
7314167 | Kiliccote | Jan 2008 | B1 |
7330871 | Barber | Feb 2008 | B2 |
7333635 | Tsantes et al. | Feb 2008 | B2 |
7340042 | Cluff et al. | Mar 2008 | B2 |
7343149 | Benco | Mar 2008 | B2 |
7356516 | Richey et al. | Apr 2008 | B2 |
7370044 | Mulhern et al. | May 2008 | B2 |
7370351 | Ramachandran et al. | May 2008 | B1 |
7376618 | Anderson et al. | May 2008 | B1 |
7383227 | Weinflash et al. | Jun 2008 | B2 |
7386448 | Poss et al. | Jun 2008 | B1 |
7386506 | Aoki et al. | Jun 2008 | B2 |
7392534 | Lu et al. | Jun 2008 | B2 |
7395273 | Khan et al. | Jul 2008 | B2 |
7398915 | Pineda-Sanchez et al. | Jul 2008 | B1 |
7418431 | Nies et al. | Aug 2008 | B1 |
7428509 | Klebanoff | Sep 2008 | B2 |
7433855 | Gavan et al. | Oct 2008 | B2 |
7433864 | Malik | Oct 2008 | B2 |
7438226 | Helsper et al. | Oct 2008 | B2 |
7444518 | Dharmarajan et al. | Oct 2008 | B1 |
7457401 | Lawyer et al. | Nov 2008 | B2 |
7458508 | Shao et al. | Dec 2008 | B1 |
7466235 | Kolb et al. | Dec 2008 | B1 |
7467401 | Cicchitto | Dec 2008 | B2 |
7480631 | Merced et al. | Jan 2009 | B1 |
7481363 | Zuili | Jan 2009 | B2 |
7490052 | Kilger et al. | Feb 2009 | B2 |
7490356 | Lieblich et al. | Feb 2009 | B2 |
7497374 | Helsper et al. | Mar 2009 | B2 |
7509117 | Yum | Mar 2009 | B2 |
7512221 | Toms | Mar 2009 | B2 |
7519558 | Ballard et al. | Apr 2009 | B2 |
7522060 | Tumperi et al. | Apr 2009 | B1 |
7533808 | Song et al. | May 2009 | B2 |
7536346 | Aliffi et al. | May 2009 | B2 |
7540021 | Page | May 2009 | B2 |
7542993 | Satterfield et al. | Jun 2009 | B2 |
7543739 | Brown et al. | Jun 2009 | B2 |
7543740 | Greene et al. | Jun 2009 | B2 |
7546271 | Chmielewski et al. | Jun 2009 | B1 |
7548886 | Kirkland et al. | Jun 2009 | B2 |
7552467 | Lindsay | Jun 2009 | B2 |
7562184 | Henmi et al. | Jul 2009 | B2 |
7562814 | Shao et al. | Jul 2009 | B1 |
7568616 | Zuili | Aug 2009 | B2 |
7575157 | Barnhardt et al. | Aug 2009 | B2 |
7580884 | Cook | Aug 2009 | B2 |
7581112 | Brown et al. | Aug 2009 | B2 |
7584146 | Duhon | Sep 2009 | B1 |
7587368 | Felsher | Sep 2009 | B2 |
7591425 | Zuili et al. | Sep 2009 | B1 |
7593891 | Kornegay et al. | Sep 2009 | B2 |
7606401 | Hoffman et al. | Oct 2009 | B2 |
7606790 | Levy | Oct 2009 | B2 |
7610216 | May et al. | Oct 2009 | B1 |
7610229 | Kornegay | Oct 2009 | B1 |
7610243 | Haggerty et al. | Oct 2009 | B2 |
7620596 | Knudson et al. | Nov 2009 | B2 |
7623844 | Herrmann et al. | Nov 2009 | B2 |
7630924 | Collins et al. | Dec 2009 | B1 |
7630932 | Danaher et al. | Dec 2009 | B2 |
7636853 | Cluts et al. | Dec 2009 | B2 |
7644868 | Hare | Jan 2010 | B2 |
7647344 | Skurtovich, Jr. et al. | Jan 2010 | B2 |
7647645 | Edeki et al. | Jan 2010 | B2 |
7653593 | Zarikian et al. | Jan 2010 | B2 |
7657431 | Hayakawa | Feb 2010 | B2 |
7668769 | Baker et al. | Feb 2010 | B2 |
7668840 | Bayliss et al. | Feb 2010 | B2 |
7668921 | Proux et al. | Feb 2010 | B2 |
7672865 | Kumar et al. | Mar 2010 | B2 |
7673793 | Greene et al. | Mar 2010 | B2 |
7676418 | Chung et al. | Mar 2010 | B1 |
7676433 | Ross et al. | Mar 2010 | B1 |
7685096 | Margolus et al. | Mar 2010 | B2 |
7686214 | Shao et al. | Mar 2010 | B1 |
7689007 | Bous et al. | Mar 2010 | B2 |
7689505 | Kasower | Mar 2010 | B2 |
7689506 | Fei et al. | Mar 2010 | B2 |
7690032 | Peirce | Mar 2010 | B1 |
7701364 | Zilberman | Apr 2010 | B1 |
7702550 | Perg et al. | Apr 2010 | B2 |
7707163 | Anzalone et al. | Apr 2010 | B2 |
7708190 | Brandt et al. | May 2010 | B2 |
7708200 | Helsper et al. | May 2010 | B2 |
7711635 | Steele et al. | May 2010 | B2 |
7711636 | Robida et al. | May 2010 | B2 |
7720750 | Brody | May 2010 | B2 |
7725300 | Pinto et al. | May 2010 | B2 |
7734523 | Cui et al. | Jun 2010 | B1 |
7735125 | Alvarez et al. | Jun 2010 | B1 |
7742982 | Chaudhuri et al. | Jun 2010 | B2 |
7747520 | Livermore et al. | Jun 2010 | B2 |
7747521 | Serio | Jun 2010 | B2 |
7747559 | Leitner et al. | Jun 2010 | B2 |
7752084 | Pettitt | Jul 2010 | B2 |
7752236 | Williams et al. | Jul 2010 | B2 |
7752554 | Biggs et al. | Jul 2010 | B2 |
7756783 | Crooks | Jul 2010 | B2 |
7761379 | Zoldi et al. | Jul 2010 | B2 |
7761384 | Madhogarhia | Jul 2010 | B2 |
7774270 | MacCloskey | Aug 2010 | B1 |
7778885 | Semprevivo et al. | Aug 2010 | B1 |
7779456 | Dennis et al. | Aug 2010 | B2 |
7779457 | Taylor | Aug 2010 | B2 |
7783515 | Kumar et al. | Aug 2010 | B1 |
7788184 | Kane | Aug 2010 | B2 |
7792715 | Kasower | Sep 2010 | B1 |
7792864 | Rice et al. | Sep 2010 | B1 |
7793835 | Coggeshall et al. | Sep 2010 | B1 |
7801811 | Merrell et al. | Sep 2010 | B1 |
7801828 | Candella et al. | Sep 2010 | B2 |
7802104 | Dickinson | Sep 2010 | B2 |
7805362 | Merrell et al. | Sep 2010 | B1 |
7805391 | Friedlander et al. | Sep 2010 | B2 |
7813944 | Luk et al. | Oct 2010 | B1 |
7827115 | Weller et al. | Nov 2010 | B2 |
7832006 | Chen et al. | Nov 2010 | B2 |
7835983 | Lefner et al. | Nov 2010 | B2 |
7840459 | Loftesness et al. | Nov 2010 | B1 |
7841004 | Balducci et al. | Nov 2010 | B1 |
7844520 | Franklin | Nov 2010 | B1 |
7848987 | Haig | Dec 2010 | B2 |
7849029 | Crooks et al. | Dec 2010 | B2 |
7853518 | Cagan | Dec 2010 | B2 |
7853526 | Milana | Dec 2010 | B2 |
7853533 | Eisen | Dec 2010 | B2 |
7853998 | Blaisdell et al. | Dec 2010 | B2 |
7856397 | Whipple et al. | Dec 2010 | B2 |
7856494 | Kulkarni | Dec 2010 | B2 |
7860769 | Benson | Dec 2010 | B2 |
7860783 | Yang et al. | Dec 2010 | B2 |
7865427 | Wright et al. | Jan 2011 | B2 |
7865439 | Seifert et al. | Jan 2011 | B2 |
7865937 | White et al. | Jan 2011 | B1 |
7870078 | Clark et al. | Jan 2011 | B2 |
7870599 | Pemmaraju | Jan 2011 | B2 |
7874488 | Parkinson | Jan 2011 | B2 |
7877304 | Coulter | Jan 2011 | B1 |
7877784 | Chow et al. | Jan 2011 | B2 |
7882548 | Heath et al. | Feb 2011 | B2 |
7890433 | Singhal | Feb 2011 | B2 |
7904360 | Evans | Mar 2011 | B2 |
7904367 | Chung et al. | Mar 2011 | B2 |
7908242 | Achanta | Mar 2011 | B1 |
7909246 | Hogg et al. | Mar 2011 | B2 |
7912865 | Akerman et al. | Mar 2011 | B2 |
7917715 | Tallman, Jr. | Mar 2011 | B2 |
7925582 | Kornegay et al. | Apr 2011 | B1 |
7929951 | Stevens et al. | Apr 2011 | B2 |
7933835 | Keane et al. | Apr 2011 | B2 |
7941363 | Tanaka et al. | May 2011 | B2 |
7945515 | Zoldi et al. | May 2011 | B2 |
7950577 | Daniel | May 2011 | B1 |
7958046 | Doerner et al. | Jun 2011 | B2 |
7961857 | Zoldi et al. | Jun 2011 | B2 |
7962404 | Metzger, II et al. | Jun 2011 | B1 |
7962467 | Howard et al. | Jun 2011 | B2 |
7970679 | Kasower | Jun 2011 | B2 |
7970698 | Gupta et al. | Jun 2011 | B2 |
7970701 | Lewis et al. | Jun 2011 | B2 |
7971246 | Emigh et al. | Jun 2011 | B1 |
7975299 | Balducci et al. | Jul 2011 | B1 |
7983976 | Nafeh et al. | Jul 2011 | B2 |
7983979 | Holland, IV | Jul 2011 | B2 |
7984849 | Berghel et al. | Jul 2011 | B2 |
7988043 | Davis | Aug 2011 | B2 |
7991201 | Bous et al. | Aug 2011 | B2 |
7991689 | Brunzell et al. | Aug 2011 | B1 |
7991716 | Crooks et al. | Aug 2011 | B2 |
7991751 | Peled et al. | Aug 2011 | B2 |
7995994 | Khetawat et al. | Aug 2011 | B2 |
7996521 | Chamberlain et al. | Aug 2011 | B2 |
8001034 | Chung et al. | Aug 2011 | B2 |
8001042 | Brunzell et al. | Aug 2011 | B1 |
8001153 | Skurtovich, Jr. et al. | Aug 2011 | B2 |
8001597 | Crooks | Aug 2011 | B2 |
8005749 | Ginsberg | Aug 2011 | B2 |
8006291 | Headley et al. | Aug 2011 | B2 |
8009873 | Chapman | Aug 2011 | B2 |
8019678 | Wright et al. | Sep 2011 | B2 |
8020763 | Kowalchyk et al. | Sep 2011 | B1 |
8024263 | Zarikian et al. | Sep 2011 | B2 |
8024271 | Grant | Sep 2011 | B2 |
8027439 | Zoldi et al. | Sep 2011 | B2 |
8027518 | Baker et al. | Sep 2011 | B2 |
8027947 | Hinsz et al. | Sep 2011 | B2 |
8028168 | Smithies et al. | Sep 2011 | B2 |
8028326 | Palmer et al. | Sep 2011 | B2 |
8028329 | Whitcomb | Sep 2011 | B2 |
8028896 | Carter et al. | Oct 2011 | B2 |
8032448 | Anderson et al. | Oct 2011 | B2 |
8032449 | Hu et al. | Oct 2011 | B2 |
8032927 | Ross | Oct 2011 | B2 |
8037097 | Guo et al. | Oct 2011 | B2 |
8037512 | Wright et al. | Oct 2011 | B2 |
8041597 | Li et al. | Oct 2011 | B2 |
8042159 | Basner et al. | Oct 2011 | B2 |
8042193 | Piliouras | Oct 2011 | B1 |
8049596 | Sato | Nov 2011 | B2 |
8055667 | Levy | Nov 2011 | B2 |
8056128 | Dingle et al. | Nov 2011 | B1 |
8058972 | Mohanty | Nov 2011 | B2 |
8060424 | Kasower | Nov 2011 | B2 |
8060915 | Voice et al. | Nov 2011 | B2 |
8060916 | Bajaj et al. | Nov 2011 | B2 |
8065233 | Lee et al. | Nov 2011 | B2 |
8065525 | Zilberman | Nov 2011 | B2 |
8069053 | Gervais et al. | Nov 2011 | B2 |
8069084 | Mackouse | Nov 2011 | B2 |
8069256 | Rasti | Nov 2011 | B2 |
8069485 | Carter | Nov 2011 | B2 |
8078569 | Kennel | Dec 2011 | B2 |
8090648 | Zoldi et al. | Jan 2012 | B2 |
8104679 | Brown | Jan 2012 | B2 |
8116731 | Buhrmann et al. | Feb 2012 | B2 |
8121962 | Vaiciulis et al. | Feb 2012 | B2 |
8131615 | Diev et al. | Mar 2012 | B2 |
8151327 | Eisen | Apr 2012 | B2 |
8195549 | Kasower | Jun 2012 | B2 |
8201257 | Andres et al. | Jun 2012 | B1 |
8204774 | Chwast et al. | Jun 2012 | B2 |
8214262 | Semprevivo et al. | Jul 2012 | B1 |
8214285 | Hu et al. | Jul 2012 | B2 |
8224723 | Bosch et al. | Jul 2012 | B2 |
8225395 | Atwood et al. | Jul 2012 | B2 |
8239677 | Colson | Aug 2012 | B2 |
8244629 | Lewis et al. | Aug 2012 | B2 |
8260914 | Ranjan | Sep 2012 | B1 |
8280805 | Abrahams et al. | Oct 2012 | B1 |
8280833 | Miltonberger | Oct 2012 | B2 |
8285613 | Coulter | Oct 2012 | B1 |
8285636 | Curry et al. | Oct 2012 | B2 |
8296225 | Maddipati et al. | Oct 2012 | B2 |
8296229 | Yellin et al. | Oct 2012 | B1 |
8296250 | Crooks et al. | Oct 2012 | B2 |
8332338 | Vaiciulis et al. | Dec 2012 | B2 |
8346593 | Fanelli | Jan 2013 | B2 |
8355896 | Kumar et al. | Jan 2013 | B2 |
8359278 | Domenikos et al. | Jan 2013 | B2 |
8364588 | Celka et al. | Jan 2013 | B2 |
8374973 | Herbrich et al. | Feb 2013 | B2 |
8386377 | Xiong et al. | Feb 2013 | B1 |
8429070 | Hu et al. | Apr 2013 | B2 |
8468090 | Lesandro et al. | Jun 2013 | B2 |
8489479 | Slater et al. | Jul 2013 | B2 |
8510329 | Balkir et al. | Aug 2013 | B2 |
8515844 | Kasower | Aug 2013 | B2 |
8516439 | Brass et al. | Aug 2013 | B2 |
8543499 | Haggerty et al. | Sep 2013 | B2 |
8548137 | Zoldi et al. | Oct 2013 | B2 |
8548903 | Becker | Oct 2013 | B2 |
8549590 | de Villiers Prichard et al. | Oct 2013 | B1 |
8559607 | Zoldi et al. | Oct 2013 | B2 |
8567669 | Griegel et al. | Oct 2013 | B2 |
8578496 | Krishnappa | Nov 2013 | B1 |
8630938 | Cheng et al. | Jan 2014 | B2 |
8639920 | Stack et al. | Jan 2014 | B2 |
8645301 | Vaiciulis et al. | Feb 2014 | B2 |
8671115 | Skurtovich, Jr. et al. | Mar 2014 | B2 |
8676684 | Newman et al. | Mar 2014 | B2 |
8676726 | Hore et al. | Mar 2014 | B2 |
8682755 | Bucholz et al. | Mar 2014 | B2 |
8683586 | Crooks | Mar 2014 | B2 |
8694427 | Maddipati et al. | Apr 2014 | B2 |
8725613 | Celka et al. | May 2014 | B1 |
8776225 | Pierson et al. | Jul 2014 | B2 |
8781953 | Kasower | Jul 2014 | B2 |
8781975 | Bennett et al. | Jul 2014 | B2 |
8793777 | Colson | Jul 2014 | B2 |
8805836 | Hore et al. | Aug 2014 | B2 |
8812387 | Samler et al. | Aug 2014 | B1 |
8819793 | Gottschalk, Jr. | Aug 2014 | B2 |
8824648 | Zoldi et al. | Sep 2014 | B2 |
8826393 | Eisen | Sep 2014 | B2 |
8862514 | Eisen | Oct 2014 | B2 |
8862526 | Miltonberger | Oct 2014 | B2 |
8909664 | Hopkins | Dec 2014 | B2 |
8918891 | Coggeshall et al. | Dec 2014 | B2 |
8949981 | Trollope et al. | Feb 2015 | B1 |
9118646 | Pierson et al. | Aug 2015 | B2 |
9191403 | Zoldi et al. | Nov 2015 | B2 |
9194899 | Zoldi et al. | Nov 2015 | B2 |
9196004 | Eisen | Nov 2015 | B2 |
9210156 | Little | Dec 2015 | B1 |
9235728 | Gottschalk, Jr. et al. | Jan 2016 | B2 |
9251541 | Celka et al. | Feb 2016 | B2 |
9256624 | Skurtovich, Jr. et al. | Feb 2016 | B2 |
9280658 | Coggeshall et al. | Mar 2016 | B2 |
9361597 | Britton et al. | Jun 2016 | B2 |
9367520 | Zhao et al. | Jun 2016 | B2 |
9390384 | Eisen | Jul 2016 | B2 |
9412141 | Prichard et al. | Aug 2016 | B2 |
9531738 | Zoldi et al. | Dec 2016 | B2 |
9558368 | Gottschalk, Jr. et al. | Jan 2017 | B2 |
9595066 | Samler et al. | Mar 2017 | B2 |
9652802 | Kasower | May 2017 | B1 |
9704195 | Zoldi | Jul 2017 | B2 |
9710523 | Skurtovich, Jr. et al. | Jul 2017 | B2 |
9710868 | Gottschalk, Jr. et al. | Jul 2017 | B2 |
9754256 | Britton et al. | Sep 2017 | B2 |
9754311 | Eisen | Sep 2017 | B2 |
9773227 | Zoldi et al. | Sep 2017 | B2 |
9953321 | Zoldi et al. | Apr 2018 | B2 |
10043213 | Straub et al. | Aug 2018 | B2 |
10089679 | Eisen | Oct 2018 | B2 |
10089686 | Straub et al. | Oct 2018 | B2 |
10102530 | Zoldi et al. | Oct 2018 | B2 |
10115153 | Zoldi et al. | Oct 2018 | B2 |
10152736 | Yang et al. | Dec 2018 | B2 |
10217163 | Straub et al. | Feb 2019 | B2 |
10242540 | Chen et al. | Mar 2019 | B2 |
10339527 | Coleman | Jul 2019 | B1 |
10373061 | Kennel et al. | Aug 2019 | B2 |
10430604 | Spinelli et al. | Oct 2019 | B2 |
10438308 | Prichard et al. | Oct 2019 | B2 |
10497034 | Yang et al. | Dec 2019 | B2 |
10510025 | Zoldi et al. | Dec 2019 | B2 |
10528948 | Zoldi et al. | Jan 2020 | B2 |
10579938 | Zoldi et al. | Mar 2020 | B2 |
10592982 | Samler et al. | Mar 2020 | B2 |
10593004 | Gottschalk, Jr. et al. | Mar 2020 | B2 |
20010014868 | Herz et al. | Aug 2001 | A1 |
20010014878 | Mitra et al. | Aug 2001 | A1 |
20010027413 | Bhutta | Oct 2001 | A1 |
20010029470 | Schultz et al. | Oct 2001 | A1 |
20010032158 | Starkman | Oct 2001 | A1 |
20010034631 | Kiselik | Oct 2001 | A1 |
20010039523 | Iwamoto | Nov 2001 | A1 |
20020010684 | Moskowitz | Jan 2002 | A1 |
20020013899 | Faul | Jan 2002 | A1 |
20020019804 | Sutton | Feb 2002 | A1 |
20020019938 | Aarons | Feb 2002 | A1 |
20020032635 | Harris et al. | Mar 2002 | A1 |
20020040344 | Preiser et al. | Apr 2002 | A1 |
20020042879 | Gould et al. | Apr 2002 | A1 |
20020052841 | Guthrie et al. | May 2002 | A1 |
20020059521 | Tasler | May 2002 | A1 |
20020062185 | Runge et al. | May 2002 | A1 |
20020062281 | Singhal | May 2002 | A1 |
20020073044 | Singhal | Jun 2002 | A1 |
20020077178 | Oberberger et al. | Jun 2002 | A1 |
20020077964 | Brody et al. | Jun 2002 | A1 |
20020080256 | Bates et al. | Jun 2002 | A1 |
20020087460 | Hornung | Jul 2002 | A1 |
20020099649 | Lee et al. | Jul 2002 | A1 |
20020119824 | Allen | Aug 2002 | A1 |
20020130176 | Suzuki | Sep 2002 | A1 |
20020138417 | Lawrence | Sep 2002 | A1 |
20020138751 | Dutta | Sep 2002 | A1 |
20020147695 | Khedkar et al. | Oct 2002 | A1 |
20020156676 | Ahrens et al. | Oct 2002 | A1 |
20020161664 | Shaya et al. | Oct 2002 | A1 |
20020161711 | Sartor et al. | Oct 2002 | A1 |
20020173994 | Ferguson, III | Nov 2002 | A1 |
20020178112 | Goeller et al. | Nov 2002 | A1 |
20020184509 | Scheidt et al. | Dec 2002 | A1 |
20020188544 | Wizon et al. | Dec 2002 | A1 |
20030004879 | Demoff et al. | Jan 2003 | A1 |
20030009426 | Ruiz-Sanchez | Jan 2003 | A1 |
20030018549 | Fei et al. | Jan 2003 | A1 |
20030033261 | Knegendorf | Feb 2003 | A1 |
20030046554 | Leydier et al. | Mar 2003 | A1 |
20030048904 | Wang et al. | Mar 2003 | A1 |
20030050882 | Degen et al. | Mar 2003 | A1 |
20030057278 | Wong | Mar 2003 | A1 |
20030061163 | Durfield | Mar 2003 | A1 |
20030065563 | Elliott et al. | Apr 2003 | A1 |
20030070101 | Buscemi | Apr 2003 | A1 |
20030078877 | Beirne et al. | Apr 2003 | A1 |
20030093366 | Halper et al. | May 2003 | A1 |
20030097320 | Gordon | May 2003 | A1 |
20030105696 | Kalotay et al. | Jun 2003 | A1 |
20030115133 | Bian | Jun 2003 | A1 |
20030143980 | Choi et al. | Jul 2003 | A1 |
20030149744 | Bierre et al. | Aug 2003 | A1 |
20030153299 | Perfit et al. | Aug 2003 | A1 |
20030158751 | Suresh et al. | Aug 2003 | A1 |
20030158960 | Engberg | Aug 2003 | A1 |
20030182214 | Taylor | Sep 2003 | A1 |
20030195859 | Lawrence | Oct 2003 | A1 |
20030200447 | Sjoblom | Oct 2003 | A1 |
20030208428 | Raynes et al. | Nov 2003 | A1 |
20030222500 | Bayeur et al. | Dec 2003 | A1 |
20030225656 | Aberman et al. | Dec 2003 | A1 |
20030225692 | Bosch et al. | Dec 2003 | A1 |
20030225742 | Tenner et al. | Dec 2003 | A1 |
20030233278 | Marshall | Dec 2003 | A1 |
20040004117 | Suzuki | Jan 2004 | A1 |
20040005912 | Hubbe et al. | Jan 2004 | A1 |
20040010698 | Rolfe | Jan 2004 | A1 |
20040024709 | Yu et al. | Feb 2004 | A1 |
20040026496 | Zuili | Feb 2004 | A1 |
20040030649 | Nelson et al. | Feb 2004 | A1 |
20040039586 | Garvey et al. | Feb 2004 | A1 |
20040054619 | Watson et al. | Mar 2004 | A1 |
20040059653 | Verkuylen et al. | Mar 2004 | A1 |
20040064401 | Palaghita et al. | Apr 2004 | A1 |
20040078324 | Lonnberg et al. | Apr 2004 | A1 |
20040103147 | Flesher et al. | May 2004 | A1 |
20040107363 | Monteverde | Jun 2004 | A1 |
20040110119 | Riconda et al. | Jun 2004 | A1 |
20040111305 | Gavan et al. | Jun 2004 | A1 |
20040111335 | Black et al. | Jun 2004 | A1 |
20040117235 | Shacham | Jun 2004 | A1 |
20040128227 | Whipple et al. | Jul 2004 | A1 |
20040128232 | Descloux | Jul 2004 | A1 |
20040133440 | Carolan et al. | Jul 2004 | A1 |
20040143526 | Monasterio et al. | Jul 2004 | A1 |
20040149820 | Zuili | Aug 2004 | A1 |
20040149827 | Zuili | Aug 2004 | A1 |
20040153330 | Miller et al. | Aug 2004 | A1 |
20040153656 | Cluts et al. | Aug 2004 | A1 |
20040158520 | Noh | Aug 2004 | A1 |
20040158523 | Dort | Aug 2004 | A1 |
20040158723 | Root | Aug 2004 | A1 |
20040167793 | Masuoka et al. | Aug 2004 | A1 |
20040177046 | Ogram | Sep 2004 | A1 |
20040193538 | Raines | Sep 2004 | A1 |
20040199456 | Flint et al. | Oct 2004 | A1 |
20040199462 | Starrs | Oct 2004 | A1 |
20040204948 | Singletary et al. | Oct 2004 | A1 |
20040225594 | Nolan, III et al. | Nov 2004 | A1 |
20040230448 | Schaich | Nov 2004 | A1 |
20040230527 | Hansen et al. | Nov 2004 | A1 |
20040230538 | Clifton et al. | Nov 2004 | A1 |
20040234117 | Tibor | Nov 2004 | A1 |
20040243514 | Wankmueller | Dec 2004 | A1 |
20040243518 | Clifton et al. | Dec 2004 | A1 |
20040243567 | Levy | Dec 2004 | A1 |
20040250085 | Tattan et al. | Dec 2004 | A1 |
20040255127 | Arnouse | Dec 2004 | A1 |
20040260922 | Goodman et al. | Dec 2004 | A1 |
20050001028 | Zuili | Jan 2005 | A1 |
20050005168 | Dick | Jan 2005 | A1 |
20050010513 | Duckworth et al. | Jan 2005 | A1 |
20050010780 | Kane et al. | Jan 2005 | A1 |
20050021476 | Candella et al. | Jan 2005 | A1 |
20050021519 | Ghouri | Jan 2005 | A1 |
20050027983 | Klawon | Feb 2005 | A1 |
20050038726 | Salomon et al. | Feb 2005 | A1 |
20050038737 | Norris | Feb 2005 | A1 |
20050050577 | Westbrook et al. | Mar 2005 | A1 |
20050058262 | Timmins et al. | Mar 2005 | A1 |
20050065950 | Chaganti et al. | Mar 2005 | A1 |
20050071282 | Lu et al. | Mar 2005 | A1 |
20050075985 | Cartmell | Apr 2005 | A1 |
20050081052 | Washington | Apr 2005 | A1 |
20050086161 | Gallant | Apr 2005 | A1 |
20050091164 | Varble | Apr 2005 | A1 |
20050097039 | Kulcsar et al. | May 2005 | A1 |
20050097051 | Madill, Jr. et al. | May 2005 | A1 |
20050097364 | Edeki et al. | May 2005 | A1 |
20050102206 | Savasoglu et al. | May 2005 | A1 |
20050105719 | Huda | May 2005 | A1 |
20050125226 | Magee | Jun 2005 | A1 |
20050125686 | Brandt | Jun 2005 | A1 |
20050138391 | Mandalia et al. | Jun 2005 | A1 |
20050144143 | Freiberg | Jun 2005 | A1 |
20050154664 | Guy et al. | Jul 2005 | A1 |
20050154665 | Kerr | Jul 2005 | A1 |
20050154671 | Doan et al. | Jul 2005 | A1 |
20050165667 | Cox | Jul 2005 | A1 |
20050197953 | Broadbent et al. | Sep 2005 | A1 |
20050203885 | Chenevich et al. | Sep 2005 | A1 |
20050216953 | Ellingson | Sep 2005 | A1 |
20050229007 | Bolle et al. | Oct 2005 | A1 |
20050240578 | Biederman et al. | Oct 2005 | A1 |
20050242173 | Suzuki | Nov 2005 | A1 |
20050251474 | Shinn et al. | Nov 2005 | A1 |
20050256809 | Sadri | Nov 2005 | A1 |
20050262014 | Fickes | Nov 2005 | A1 |
20050273333 | Morin et al. | Dec 2005 | A1 |
20050278542 | Pierson et al. | Dec 2005 | A1 |
20050279827 | Mascavage et al. | Dec 2005 | A1 |
20050279869 | Barklage | Dec 2005 | A1 |
20060004663 | Singhal | Jan 2006 | A1 |
20060014129 | Coleman et al. | Jan 2006 | A1 |
20060032909 | Seegar | Feb 2006 | A1 |
20060041464 | Powers et al. | Feb 2006 | A1 |
20060045105 | Dobosz et al. | Mar 2006 | A1 |
20060047605 | Ahmad | Mar 2006 | A1 |
20060059073 | Walzak | Mar 2006 | A1 |
20060059110 | Madhok et al. | Mar 2006 | A1 |
20060064374 | Helsper et al. | Mar 2006 | A1 |
20060074798 | Din et al. | Apr 2006 | A1 |
20060074986 | Mallalieu et al. | Apr 2006 | A1 |
20060080230 | Freiberg | Apr 2006 | A1 |
20060080263 | Willis et al. | Apr 2006 | A1 |
20060089905 | Song et al. | Apr 2006 | A1 |
20060101508 | Taylor | May 2006 | A1 |
20060106605 | Saunders et al. | May 2006 | A1 |
20060112279 | Cohen et al. | May 2006 | A1 |
20060112280 | Cohen et al. | May 2006 | A1 |
20060129428 | Wennberg | Jun 2006 | A1 |
20060129481 | Bhatt et al. | Jun 2006 | A1 |
20060129840 | Milgramm et al. | Jun 2006 | A1 |
20060131390 | Kim | Jun 2006 | A1 |
20060136332 | Ziegler | Jun 2006 | A1 |
20060140460 | Coutts | Jun 2006 | A1 |
20060143073 | Engel et al. | Jun 2006 | A1 |
20060144924 | Stover | Jul 2006 | A1 |
20060149580 | Helsper et al. | Jul 2006 | A1 |
20060149674 | Cook et al. | Jul 2006 | A1 |
20060161435 | Atef et al. | Jul 2006 | A1 |
20060173776 | Shalley et al. | Aug 2006 | A1 |
20060173792 | Glass | Aug 2006 | A1 |
20060177226 | Ellis, III | Aug 2006 | A1 |
20060178971 | Owen et al. | Aug 2006 | A1 |
20060179004 | Fuchs | Aug 2006 | A1 |
20060195351 | Bayburtian | Aug 2006 | A1 |
20060200855 | Willis | Sep 2006 | A1 |
20060202012 | Grano et al. | Sep 2006 | A1 |
20060204051 | Holland, IV | Sep 2006 | A1 |
20060206725 | Milgramm et al. | Sep 2006 | A1 |
20060212386 | Willey et al. | Sep 2006 | A1 |
20060218069 | Aberman et al. | Sep 2006 | A1 |
20060229961 | Lyftogt et al. | Oct 2006 | A1 |
20060239512 | Petrillo | Oct 2006 | A1 |
20060239513 | Song et al. | Oct 2006 | A1 |
20060242046 | Haggerty et al. | Oct 2006 | A1 |
20060242047 | Haggerty et al. | Oct 2006 | A1 |
20060253358 | Delgrosso et al. | Nov 2006 | A1 |
20060253583 | Dixon et al. | Nov 2006 | A1 |
20060255914 | Westman | Nov 2006 | A1 |
20060262929 | Vatanen et al. | Nov 2006 | A1 |
20060265243 | Racho et al. | Nov 2006 | A1 |
20060271456 | Romain et al. | Nov 2006 | A1 |
20060271457 | Romain et al. | Nov 2006 | A1 |
20060271633 | Adler | Nov 2006 | A1 |
20060273158 | Suzuki | Dec 2006 | A1 |
20060277043 | Tomes et al. | Dec 2006 | A1 |
20060282285 | Helsper et al. | Dec 2006 | A1 |
20060282372 | Endres et al. | Dec 2006 | A1 |
20060282395 | Leibowitz | Dec 2006 | A1 |
20060287765 | Kraft | Dec 2006 | A1 |
20060288090 | Kraft | Dec 2006 | A1 |
20060294023 | Lu | Dec 2006 | A1 |
20070005508 | Chiang | Jan 2007 | A1 |
20070011100 | Libin et al. | Jan 2007 | A1 |
20070016500 | Chatterji et al. | Jan 2007 | A1 |
20070016521 | Wang | Jan 2007 | A1 |
20070016522 | Wang | Jan 2007 | A1 |
20070022141 | Singleton et al. | Jan 2007 | A1 |
20070038483 | Wood | Feb 2007 | A1 |
20070038568 | Greene et al. | Feb 2007 | A1 |
20070040017 | Kozlay | Feb 2007 | A1 |
20070040019 | Berghel et al. | Feb 2007 | A1 |
20070043577 | Kasower | Feb 2007 | A1 |
20070047770 | Swope et al. | Mar 2007 | A1 |
20070048765 | Abramson | Mar 2007 | A1 |
20070050638 | Rasti | Mar 2007 | A1 |
20070059442 | Sabeta | Mar 2007 | A1 |
20070061273 | Greene et al. | Mar 2007 | A1 |
20070067207 | Haggerty et al. | Mar 2007 | A1 |
20070067297 | Kublickis | Mar 2007 | A1 |
20070072190 | Aggarwal | Mar 2007 | A1 |
20070073622 | Kane | Mar 2007 | A1 |
20070073630 | Greene et al. | Mar 2007 | A1 |
20070078786 | Bous et al. | Apr 2007 | A1 |
20070078908 | Rohatgi et al. | Apr 2007 | A1 |
20070078985 | Shao et al. | Apr 2007 | A1 |
20070083460 | Bachenheimer | Apr 2007 | A1 |
20070087795 | Aletto et al. | Apr 2007 | A1 |
20070093234 | Willis et al. | Apr 2007 | A1 |
20070094137 | Phillips et al. | Apr 2007 | A1 |
20070094264 | Nair | Apr 2007 | A1 |
20070100774 | Abdon | May 2007 | A1 |
20070106582 | Baker et al. | May 2007 | A1 |
20070106611 | Larsen | May 2007 | A1 |
20070107050 | Selvarajan | May 2007 | A1 |
20070109103 | Jedrey et al. | May 2007 | A1 |
20070110282 | Millsapp | May 2007 | A1 |
20070112667 | Rucker | May 2007 | A1 |
20070112668 | Celano et al. | May 2007 | A1 |
20070118393 | Rosen et al. | May 2007 | A1 |
20070155411 | Morrison | Jul 2007 | A1 |
20070157299 | Hare | Jul 2007 | A1 |
20070168246 | Haggerty et al. | Jul 2007 | A1 |
20070168480 | Biggs et al. | Jul 2007 | A1 |
20070174208 | Black et al. | Jul 2007 | A1 |
20070179903 | Seinfeld et al. | Aug 2007 | A1 |
20070180209 | Tallman | Aug 2007 | A1 |
20070180263 | Delgrosso et al. | Aug 2007 | A1 |
20070186276 | McRae et al. | Aug 2007 | A1 |
20070192248 | West | Aug 2007 | A1 |
20070192853 | Shraim et al. | Aug 2007 | A1 |
20070198410 | Labgold et al. | Aug 2007 | A1 |
20070205266 | Carr et al. | Sep 2007 | A1 |
20070208669 | Rivette et al. | Sep 2007 | A1 |
20070214037 | Shubert et al. | Sep 2007 | A1 |
20070214365 | Cornett et al. | Sep 2007 | A1 |
20070219928 | Madhogarhia | Sep 2007 | A1 |
20070220594 | Tulsyan | Sep 2007 | A1 |
20070226093 | Chan et al. | Sep 2007 | A1 |
20070226129 | Liao et al. | Sep 2007 | A1 |
20070233614 | McNelley et al. | Oct 2007 | A1 |
20070234427 | Gardner et al. | Oct 2007 | A1 |
20070244782 | Chimento | Oct 2007 | A1 |
20070244807 | Andringa et al. | Oct 2007 | A1 |
20070250704 | Hallam-Baker | Oct 2007 | A1 |
20070250920 | Lindsay | Oct 2007 | A1 |
20070266439 | Kraft | Nov 2007 | A1 |
20070282730 | Carpenter et al. | Dec 2007 | A1 |
20070288355 | Roland et al. | Dec 2007 | A1 |
20070288360 | Seeklus | Dec 2007 | A1 |
20070288559 | Parsadayan | Dec 2007 | A1 |
20070291995 | Rivera | Dec 2007 | A1 |
20070292006 | Johnson | Dec 2007 | A1 |
20070294104 | Boaz et al. | Dec 2007 | A1 |
20070299759 | Kelly | Dec 2007 | A1 |
20080010203 | Grant | Jan 2008 | A1 |
20080010683 | Baddour et al. | Jan 2008 | A1 |
20080010687 | Gonen et al. | Jan 2008 | A1 |
20080015887 | Drabek et al. | Jan 2008 | A1 |
20080021804 | Deckoff | Jan 2008 | A1 |
20080027857 | Benson | Jan 2008 | A1 |
20080027858 | Benson | Jan 2008 | A1 |
20080052182 | Marshall | Feb 2008 | A1 |
20080059236 | Cartier | Mar 2008 | A1 |
20080059352 | Chandran | Mar 2008 | A1 |
20080059364 | Tidwell et al. | Mar 2008 | A1 |
20080059366 | Fou | Mar 2008 | A1 |
20080063172 | Ahuja et al. | Mar 2008 | A1 |
20080066188 | Kwak | Mar 2008 | A1 |
20080071882 | Hering et al. | Mar 2008 | A1 |
20080076386 | Khetawat et al. | Mar 2008 | A1 |
20080077526 | Arumugam | Mar 2008 | A1 |
20080098222 | Zilberman | Apr 2008 | A1 |
20080103798 | Domenikos et al. | May 2008 | A1 |
20080103799 | Domenikos et al. | May 2008 | A1 |
20080103800 | Domenikos et al. | May 2008 | A1 |
20080103811 | Sosa | May 2008 | A1 |
20080103972 | Lanc | May 2008 | A1 |
20080104021 | Cai et al. | May 2008 | A1 |
20080104672 | Lunde et al. | May 2008 | A1 |
20080114837 | Biggs et al. | May 2008 | A1 |
20080120237 | Lin | May 2008 | A1 |
20080126116 | Singhai | May 2008 | A1 |
20080126233 | Hogan | May 2008 | A1 |
20080147454 | Walker et al. | Jun 2008 | A1 |
20080154758 | Schattmaier et al. | Jun 2008 | A1 |
20080162202 | Khanna et al. | Jul 2008 | A1 |
20080162383 | Kraft | Jul 2008 | A1 |
20080167883 | Thavildar Khazaneh | Jul 2008 | A1 |
20080175360 | Schwarz et al. | Jul 2008 | A1 |
20080177655 | Zalik | Jul 2008 | A1 |
20080177841 | Sinn et al. | Jul 2008 | A1 |
20080189789 | Lamontagne | Aug 2008 | A1 |
20080208548 | Metzger et al. | Aug 2008 | A1 |
20080208610 | Thomas et al. | Aug 2008 | A1 |
20080208726 | Tsantes et al. | Aug 2008 | A1 |
20080217400 | Portano | Sep 2008 | A1 |
20080228635 | Megdal et al. | Sep 2008 | A1 |
20080243680 | Megdal et al. | Oct 2008 | A1 |
20080244717 | Jelatis et al. | Oct 2008 | A1 |
20080255922 | Feldman et al. | Oct 2008 | A1 |
20080255992 | Lin | Oct 2008 | A1 |
20080256613 | Grover | Oct 2008 | A1 |
20080281737 | Fajardo | Nov 2008 | A1 |
20080281743 | Pettit | Nov 2008 | A1 |
20080288382 | Smith et al. | Nov 2008 | A1 |
20080288430 | Friedlander et al. | Nov 2008 | A1 |
20080288790 | Wilson | Nov 2008 | A1 |
20080294540 | Celka et al. | Nov 2008 | A1 |
20080294689 | Metzger et al. | Nov 2008 | A1 |
20080296367 | Parkinson | Dec 2008 | A1 |
20080296382 | Connell, II et al. | Dec 2008 | A1 |
20080300877 | Gilbert et al. | Dec 2008 | A1 |
20080319889 | Hammad | Dec 2008 | A1 |
20090007220 | Ormazabal et al. | Jan 2009 | A1 |
20090018934 | Peng et al. | Jan 2009 | A1 |
20090021349 | Errico et al. | Jan 2009 | A1 |
20090024417 | Marks et al. | Jan 2009 | A1 |
20090024505 | Patel et al. | Jan 2009 | A1 |
20090024636 | Shiloh | Jan 2009 | A1 |
20090024663 | McGovern | Jan 2009 | A1 |
20090026270 | Connell, II et al. | Jan 2009 | A1 |
20090043637 | Eder | Feb 2009 | A1 |
20090044279 | Crawford et al. | Feb 2009 | A1 |
20090048957 | Celano | Feb 2009 | A1 |
20090079539 | Johnson | Mar 2009 | A1 |
20090094311 | Awadallah et al. | Apr 2009 | A1 |
20090099960 | Robida et al. | Apr 2009 | A1 |
20090106153 | Ezra | Apr 2009 | A1 |
20090106846 | Dupray et al. | Apr 2009 | A1 |
20090112650 | Iwane | Apr 2009 | A1 |
20090119106 | Rajakumar et al. | May 2009 | A1 |
20090119299 | Rhodes | May 2009 | A1 |
20090125369 | Kloostra et al. | May 2009 | A1 |
20090125439 | Zarikian et al. | May 2009 | A1 |
20090125463 | Hido | May 2009 | A1 |
20090138391 | Dudley et al. | May 2009 | A1 |
20090141318 | Hughes | Jun 2009 | A1 |
20090151005 | Bell et al. | Jun 2009 | A1 |
20090158404 | Hahn et al. | Jun 2009 | A1 |
20090164380 | Brown | Jun 2009 | A1 |
20090172815 | Gu et al. | Jul 2009 | A1 |
20090182653 | Zimiles | Jul 2009 | A1 |
20090199264 | Lang | Aug 2009 | A1 |
20090205032 | Hinton et al. | Aug 2009 | A1 |
20090206993 | Di Mambro et al. | Aug 2009 | A1 |
20090216560 | Siegel | Aug 2009 | A1 |
20090222308 | Zoldi et al. | Sep 2009 | A1 |
20090222362 | Stood et al. | Sep 2009 | A1 |
20090222373 | Choudhuri et al. | Sep 2009 | A1 |
20090222374 | Choudhuri et al. | Sep 2009 | A1 |
20090222375 | Choudhuri et al. | Sep 2009 | A1 |
20090222376 | Choudhuri et al. | Sep 2009 | A1 |
20090222377 | Choudhuri et al. | Sep 2009 | A1 |
20090222378 | Choudhuri et al. | Sep 2009 | A1 |
20090222379 | Choudhuri et al. | Sep 2009 | A1 |
20090222380 | Choudhuri et al. | Sep 2009 | A1 |
20090222897 | Carow et al. | Sep 2009 | A1 |
20090224875 | Rabinowitz et al. | Sep 2009 | A1 |
20090224889 | Aggarwal et al. | Sep 2009 | A1 |
20090226056 | Vlachos et al. | Sep 2009 | A1 |
20090234738 | Britton et al. | Sep 2009 | A1 |
20090240609 | Cho et al. | Sep 2009 | A1 |
20090241168 | Readshaw | Sep 2009 | A1 |
20090241173 | Troyansky | Sep 2009 | A1 |
20090248198 | Siegel et al. | Oct 2009 | A1 |
20090248497 | Hueter | Oct 2009 | A1 |
20090248567 | Haggerty et al. | Oct 2009 | A1 |
20090248568 | Haggerty et al. | Oct 2009 | A1 |
20090248569 | Haggerty et al. | Oct 2009 | A1 |
20090248570 | Haggerty et al. | Oct 2009 | A1 |
20090248571 | Haggerty et al. | Oct 2009 | A1 |
20090248572 | Haggerty et al. | Oct 2009 | A1 |
20090248573 | Haggerty et al. | Oct 2009 | A1 |
20090254476 | Sharma et al. | Oct 2009 | A1 |
20090254484 | Forero et al. | Oct 2009 | A1 |
20090257595 | de Cesare et al. | Oct 2009 | A1 |
20090259470 | Chang | Oct 2009 | A1 |
20090259560 | Bachenheimer | Oct 2009 | A1 |
20090259588 | Lindsay | Oct 2009 | A1 |
20090259855 | de Cesare et al. | Oct 2009 | A1 |
20090261189 | Ellis, Jr. | Oct 2009 | A1 |
20090270126 | Liu | Oct 2009 | A1 |
20090271265 | Lay et al. | Oct 2009 | A1 |
20090271617 | Song et al. | Oct 2009 | A1 |
20090272801 | Connell, II et al. | Nov 2009 | A1 |
20090276244 | Baldwin, Jr. et al. | Nov 2009 | A1 |
20090281945 | Shakkarwar | Nov 2009 | A1 |
20090281951 | Shakkarwar | Nov 2009 | A1 |
20090289110 | Regen et al. | Nov 2009 | A1 |
20090300066 | Guo et al. | Dec 2009 | A1 |
20090307778 | Mardikar | Dec 2009 | A1 |
20090326972 | Washington | Dec 2009 | A1 |
20090328173 | Jakobson et al. | Dec 2009 | A1 |
20100024037 | Grzymala-Busse et al. | Jan 2010 | A1 |
20100030677 | Melik-Aslanian et al. | Feb 2010 | A1 |
20100031030 | Kao et al. | Feb 2010 | A1 |
20100037147 | Champion et al. | Feb 2010 | A1 |
20100037308 | Lin et al. | Feb 2010 | A1 |
20100042526 | Martinov | Feb 2010 | A1 |
20100043055 | Baumgart | Feb 2010 | A1 |
20100070620 | Awadallah et al. | Mar 2010 | A1 |
20100077006 | El Emam et al. | Mar 2010 | A1 |
20100085146 | Johnson | Apr 2010 | A1 |
20100088233 | Tattan et al. | Apr 2010 | A1 |
20100088338 | Pavoni, Jr. et al. | Apr 2010 | A1 |
20100094664 | Bush et al. | Apr 2010 | A1 |
20100094767 | Miltonberger | Apr 2010 | A1 |
20100094768 | Miltonberger | Apr 2010 | A1 |
20100094910 | Bayliss | Apr 2010 | A1 |
20100095357 | Willis et al. | Apr 2010 | A1 |
20100100406 | Lim | Apr 2010 | A1 |
20100100945 | Ozzie et al. | Apr 2010 | A1 |
20100107225 | Spencer et al. | Apr 2010 | A1 |
20100114724 | Ghosh et al. | May 2010 | A1 |
20100114744 | Gonen | May 2010 | A1 |
20100121767 | Coulter et al. | May 2010 | A1 |
20100130172 | Vendrow et al. | May 2010 | A1 |
20100131273 | Aley-Raz et al. | May 2010 | A1 |
20100132043 | Bjorn et al. | May 2010 | A1 |
20100145836 | Baker et al. | Jun 2010 | A1 |
20100158207 | Dhawan et al. | Jun 2010 | A1 |
20100169210 | Bous et al. | Jul 2010 | A1 |
20100169947 | Sarmah et al. | Jul 2010 | A1 |
20100188684 | Kumara | Jul 2010 | A1 |
20100205662 | Ibrahim et al. | Aug 2010 | A1 |
20100217837 | Ansari et al. | Aug 2010 | A1 |
20100218255 | Ritman et al. | Aug 2010 | A1 |
20100228649 | Pettitt | Sep 2010 | A1 |
20100228657 | Kagarlis | Sep 2010 | A1 |
20100229225 | Sarmah et al. | Sep 2010 | A1 |
20100229230 | Edeki et al. | Sep 2010 | A1 |
20100229245 | Singhal | Sep 2010 | A1 |
20100241501 | Marshall | Sep 2010 | A1 |
20100250364 | Song et al. | Sep 2010 | A1 |
20100250411 | Ogrodski | Sep 2010 | A1 |
20100250509 | Andersen | Sep 2010 | A1 |
20100250955 | Trevithick et al. | Sep 2010 | A1 |
20100268557 | Faith et al. | Oct 2010 | A1 |
20100274679 | Hammad | Oct 2010 | A1 |
20100275265 | Fiske et al. | Oct 2010 | A1 |
20100293090 | Domenikos et al. | Nov 2010 | A1 |
20100293114 | Khan et al. | Nov 2010 | A1 |
20100302157 | Zilberman | Dec 2010 | A1 |
20100306101 | Lefner et al. | Dec 2010 | A1 |
20100313273 | Freas | Dec 2010 | A1 |
20100325035 | Hilgers et al. | Dec 2010 | A1 |
20100325442 | Petrone et al. | Dec 2010 | A1 |
20100332292 | Anderson | Dec 2010 | A1 |
20100332362 | Ramsey et al. | Dec 2010 | A1 |
20110004498 | Readshaw | Jan 2011 | A1 |
20110016042 | Cho et al. | Jan 2011 | A1 |
20110040983 | Grzymala-Busse et al. | Feb 2011 | A1 |
20110047071 | Choudhuri et al. | Feb 2011 | A1 |
20110066547 | Clark et al. | Mar 2011 | A1 |
20110082768 | Eisen | Apr 2011 | A1 |
20110093383 | Haggerty et al. | Apr 2011 | A1 |
20110112958 | Haggerty et al. | May 2011 | A1 |
20110119291 | Rice | May 2011 | A1 |
20110126024 | Beatson et al. | May 2011 | A1 |
20110126275 | Anderson et al. | May 2011 | A1 |
20110145899 | Cao et al. | Jun 2011 | A1 |
20110166988 | Coulter | Jul 2011 | A1 |
20110184838 | Winters et al. | Jul 2011 | A1 |
20110184851 | Megdal et al. | Jul 2011 | A1 |
20110196791 | Dominguez | Aug 2011 | A1 |
20110238566 | Santos | Sep 2011 | A1 |
20110260832 | Ross et al. | Oct 2011 | A1 |
20110276496 | Neville et al. | Nov 2011 | A1 |
20110282778 | Wright et al. | Nov 2011 | A1 |
20110289032 | Crooks et al. | Nov 2011 | A1 |
20110289322 | Rasti | Nov 2011 | A1 |
20110295721 | MacDonald | Dec 2011 | A1 |
20110295750 | Rammal | Dec 2011 | A1 |
20110296529 | Bhanoo et al. | Dec 2011 | A1 |
20110302412 | Deng et al. | Dec 2011 | A1 |
20110302641 | Hald et al. | Dec 2011 | A1 |
20120030080 | Slater et al. | Feb 2012 | A1 |
20120030083 | Newman et al. | Feb 2012 | A1 |
20120030771 | Pierson et al. | Feb 2012 | A1 |
20120066073 | Dilip et al. | Mar 2012 | A1 |
20120101939 | Kasower | Apr 2012 | A1 |
20120158574 | Brunzell et al. | Jun 2012 | A1 |
20120158654 | Behren et al. | Jun 2012 | A1 |
20120198556 | Patel et al. | Aug 2012 | A1 |
20120215682 | Lent et al. | Aug 2012 | A1 |
20120278227 | Kolo et al. | Nov 2012 | A1 |
20120290660 | Rao et al. | Nov 2012 | A1 |
20130004033 | Trugenberger et al. | Jan 2013 | A1 |
20130185293 | Boback | Jul 2013 | A1 |
20130218797 | Prichard et al. | Aug 2013 | A1 |
20140007238 | Magee et al. | Jan 2014 | A1 |
20140058910 | Abeles | Feb 2014 | A1 |
20140149304 | Bucholz et al. | May 2014 | A1 |
20140214636 | Rajsky | Jul 2014 | A1 |
20150186901 | Miltonberger | Jul 2015 | A1 |
20150199784 | Straub et al. | Jul 2015 | A1 |
20150295924 | Gottschalk, Jr. | Oct 2015 | A1 |
20160012561 | Lappenbusch et al. | Jan 2016 | A1 |
20160063645 | Houseworth | Mar 2016 | A1 |
20160071208 | Straub et al. | Mar 2016 | A1 |
20160086262 | Straub et al. | Mar 2016 | A1 |
20160328814 | Prichard et al. | Nov 2016 | A1 |
20160344758 | Cohen et al. | Nov 2016 | A1 |
20170053369 | Gottschalk, Jr. et al. | Feb 2017 | A1 |
20170099314 | Klatt et al. | Apr 2017 | A1 |
20170270629 | Fitzgerald | Sep 2017 | A1 |
20170278182 | Kasower | Sep 2017 | A1 |
20170287065 | Samler et al. | Oct 2017 | A1 |
20170374076 | Pierson et al. | Dec 2017 | A1 |
20180130157 | Gottschalk, Jr. et al. | May 2018 | A1 |
20180322572 | Straub et al. | Nov 2018 | A1 |
20190311366 | Zoldi et al. | Oct 2019 | A1 |
20190377896 | Spinelli et al. | Dec 2019 | A1 |
20200134629 | Zoldi et al. | Apr 2020 | A1 |
20200145436 | Brown et al. | May 2020 | A1 |
20200151628 | Zoldi et al. | May 2020 | A1 |
Number | Date | Country |
---|---|---|
104877993 | Sep 2015 | CN |
91 08 341 | Oct 1991 | DE |
0 554 083 | Aug 1993 | EP |
2 939 361 | Oct 2019 | EP |
2 392 748 | Mar 2004 | GB |
2 518 099 | Mar 2015 | GB |
2011-134252 | Jul 2011 | JP |
5191376 | May 2013 | JP |
10-2004-0034063 | Apr 2004 | KR |
256569 | Jun 2006 | TW |
WO 94006103 | Mar 1994 | WO |
WO 96041488 | Dec 1996 | WO |
WO 00055778 | Sep 2000 | WO |
WO 00055789 | Sep 2000 | WO |
WO 00055790 | Sep 2000 | WO |
WO 01011522 | Feb 2001 | WO |
WO 02027610 | Apr 2002 | WO |
WO 02097563 | Dec 2002 | WO |
WO 03071388 | Aug 2003 | WO |
WO 02037219 | May 2004 | WO |
WO 2004046882 | Jun 2004 | WO |
WO 2006069199 | Jun 2006 | WO |
WO 2007001394 | Jan 2007 | WO |
WO 2007106393 | Sep 2007 | WO |
WO 2008054403 | May 2008 | WO |
WO 2008054849 | May 2008 | WO |
WO 2008147918 | Dec 2008 | WO |
WO 2009062111 | May 2009 | WO |
WO 2009117518 | Sep 2009 | WO |
WO 2011044036 | Apr 2011 | WO |
WO 2012054646 | Apr 2012 | WO |
WO 2012112781 | Aug 2012 | WO |
WO 2013026343 | Feb 2013 | WO |
WO 2013126281 | Aug 2013 | WO |
WO 2014008079 | Jan 2014 | WO |
WO 2014008247 | Jan 2014 | WO |
WO 2014150987 | Sep 2014 | WO |
WO 2018175440 | Sep 2018 | WO |
WO 2018208770 | Nov 2018 | WO |
WO 2019006272 | Jan 2019 | WO |
Entry |
---|
“The Return Review Program Increases Fraud Detection; However, Full Retirement of the Electronic Fraud Detection System Will Be Delayed”, Treasury Inspector General for Tax Administration (Year: 2017). |
Official Communication in Australian Patent Application No. 2017203586, dated Jun. 18, 2019. |
U.S. Appl. No. 09/557,252, filed Apr. 24, 2000, Page. |
U.S. Appl. No. 12/705,489, filed Feb. 12, 2010, Bargoli et al. |
U.S. Appl. No. 12/705,511, filed Feb. 12, 2010, Bargoli et al. |
“A New Approach to Fraud Solutions”, BasePoint Science Solving Fraud, pp. 8, 2006. |
AAD et al., “NRC Data Collection and the Privacy by Design Principles”, IEEE, Nov. 2010, pp. 5. |
“Arizona Company Has Found Key in Stopping ID Theft,” PR Newswire, New York, Aug. 10, 2005 http://proquest.umi.com/pqdweb?did=880104711&sid=1&Fmt=3&clientId=19649&RQT=309&Vname=PQD. |
ABC News Now: Money Matters, as broadcasted Nov. 15, 2005 with guest Todd Davis (CEO of Lifelock), pp. 6. |
Anonymous, “Feedback”, Credit Management, ABI/INFORM Global, Sep. 2006, pp. 6. |
“Beverly Hills Man Convicted of Operating ‘Bust-Out’ Schemes that Caused More than $8 Million in Losses”, Department of Justice, Jul. 25, 2006, 2 Pgs. |
Bielski, Lauren, “Will you Spend to Thwart ID Theft?” ABA Banking Journal, Apr. 2005, pp. 54, 56-57, 60. |
BlueCava, “What We Do”, http://www.bluecava.com/what-we-do/, printed Nov. 5, 2012 in 3 pages. |
“Bust-Out Schemes”, Visual Analytics Inc. Technical Product Support, Newsletter vol. 4, Issue 1, Jan. 2005, pp. 7. |
Chores & Allowances, “Do Kids Have Credit Reports?” Oct. 15, 2007, http://choresandallowances.blogspot.com/2007/10/do-kids-have-credit-reports.html, pp. 5. |
Cowie, Norman, “Warning Bells & ‘The Bust-Out’”, Business Credit, Jul. 1, 2000, pp. 5. |
Cullen, Terri; “The Wall Street Journal Complete Identity Theft Guidebook:How to Protect Yourself from the Most Pervasive Crime in America”; Chapter 3, pp. 59-79; Jul. 10, 2007. |
“Data Loss Prevention (DLP) Software”, http://www.symantec.com/data-loss-prevention/ printed Apr. 8, 2013 in 8 pages. |
“Data Protection”, http://compliantprocessing.com/data-protection/ printed Apr. 8, 2013 in 4 pages. |
Day, Jo and Kevin; “ID-ology: A Planner's Guide to Identity Theft”; Journal of Financial Planning:Tech Talk; pp. 36-38; Sep. 2004. |
eFunds Corporation, “Data & Decisioning: Debit Report” printed Apr. 1, 2007, http://www.efunds.com/web/industry-solutions/financial-services/frm-debit-report/htm in 1 page. |
Equifax; “Equifax Credit Watch”; https://www.econsumer.equifax.co.uk/consumer/uk/sitepage.ehtml, dated Jun. 27, 2007 on www.archive.org. |
Experian Team, “Impact on Credit Scores of Inquiries for an Auto Loan,” Ask Experian, Mar. 1, 2009, pp. 5. |
“Fair Isaac Introduces Falcon One System to Combat Fraud at Every Customer Interaction”, Business Wire, May 5, 2005, pp. 3. |
“Fair Isaac Offers New Fraud Tool”, National Mortgage News & Source Media, Inc., Jun. 13, 2005, pp. 2. |
FamilySecure.com, “Frequently Asked Questions”, http://www.familysecure.com/FAQ.aspx as archived Jul. 15, 2007 in 3 pages. |
FamilySecure.com; “Identity Theft Protection for the Whole Family | FamilySecure.com” http://www.familysecure.com/, as retrieved on Nov. 5, 2009. |
“Fighting the New Face of Fraud”, FinanceTech, http://www.financetech.com/showArticle.jhtml?articleID=167100405, Aug. 2, 2005. |
“FinExtra, Basepoint Analytics Introduces Predictive Technology for Mortgage Fraud”, Oct. 5, 2005, pp. 3. |
Fisher, Joseph, “Access to Fair Credit Reports: Current Practices and Proposed Legislation,” American Business Law Journal, Fall 1981, vol. 19, No. 3, p. 319. |
“Fraud Alert | Learn How”. Fight Identity Theft. http://www.fightidentitytheft.com/flag.html, accessed on Nov. 5, 2009. |
GIBBS, Adrienne; “Protecting Your Children from Identity Theft,” Nov. 25, 2008, http://www.creditcards.com/credit-card-news/identity-ID-theft-and-kids-children-1282.php, pp. 4. |
“GLBA Compliance and FFIEC Compliance” http://www.trustwave.com/financial-services.php printed Apr. 8, 2013 in 1 page. |
Gordon et al., “Identity Fraud: A Critical National and Global Threat,” LexisNexis, Oct. 28, 2003, pp. 1-48. |
Haglund, Christoffer, “Two-Factor Authentication With a Mobile Phone”, Fox Technologies, Uppsala, Department of Information Technology, Nov. 2, 2007, pp. 62. |
Herzberg, Amir, “Payments and Banking with Mobile Personal Devices,” Communications of the ACM, May 2003, vol. 46, No. 5, pp. 53-58. |
“ID Analytics ID Network”, from www.idanalytics.com, as retrieved from www.archive.org, dated Nov. 20, 2005 or earlier; attached as “ID Network (IDNb)”, pp. 8. |
ID Cops, www.idcops.com; retrieved from www.archive.org any linkage Feb. 16, 2007. |
ID Theft Assist, “Do You Know Where Your Child's Credit Is?”, Nov. 26, 2007, http://www.idtheftassist.com/pages/story14, pp. 3. |
“ID Thieves These Days Want Your Number, Not Your Name”, The Columbus Dispatch, Columbus, Ohio, http://www.dispatch.com/content/stories/business/2014/08/03/id-thieves-these-days-want-your-number-not-your-name.html, Aug. 3, 2014 in 2 pages. |
Identity Theft Resource Center; Fact Sheet 120 A—To Order a Credit Report for a Child; Fact Sheets, Victim Resources; Apr. 30, 2007. |
“Identity Thieves Beware: Lifelock Introduces Nation's First Guaranteed Proactive Solution to Identity Theft Protection,” PR Newswire, New York, Jun. 13, 2005 http://proquest.umi.com/pqdweb?did=852869731&sid=1&Fmt=3&clientId=19649&RQT=309&Vname=PQD. |
“Industry News, New Technology Identifies Mortgage Fraud: Basepoint Analytics Launches FraudMark”, Inman News, American Land Title Association, Oct. 5, 2005, pp. 1. |
Information Brokers of America, “Information Brokers of America Child Identity Theft Protection” http://web.archive.org/web/20080706135451/http://iboainfo.com/child-order.html as archived Jul. 6, 2008 in 1 page. |
Information Brokers of America, “Safeguard Your Child's Credit”, http://web.archive.org/web/20071215210406/http://www.iboainfo.com/child-id-protect.html as archived Dec. 15, 2007 in 1 page. |
“Intersections, Inc. Identity Guard”, from www.intersections.com and www.identityguard.com, as retrieved from Internet Archive, dated Nov. 25, 2005 or earlier; attached as “Identity Guard (IDG)”, pp. 7. |
Iovation, Device Identification & Device Fingerprinting, http://www.iovation.com/risk-management/device-identification printed Nov. 5, 2012 in 6 pages. |
Jacob et al., A Case Study of Checking Account Inquiries and Closures in Chicago, The Center for Financial Services Innovation, Nov. 2006. |
Karlan et al., “Observing Unobservables:Identifying Information Asymmetries with a Consumer Credit Field Experiment”, Jun. 17, 2006, pp. 58, http://aida.econ.yale.edu/karlan/papers/ObservingUnobservables.KarlanZinman.pdf. |
Khan, Muhammad Khurram, PhD., “An Efficient and Secure Remote Mutual Authentication Scheme with Smart Cards” IEEE International Symposium on Biometrics & Security Technologies (ISBAST), Apr. 23-24, 2008, pp. 1-6. |
Lamons, Bob, “Be Smart: Offer Inquiry Qualification Services,” Marketing News, ABI/Inform Global, Nov. 6, 1995, vol. 29, No. 23, pp. 13. |
Lee, Timothy B., “How America's Broken Tax System Makes Identity Theft Easy”, http://www.vox.com/2014/4/14/5608072/how-americas-broken-tax-system-makes-identity-theft-easy, Apr. 14, 2014, pp. 10. |
Lee, W.A.; “Experian, on Deal Hunt, Nets Identity Theft Insurer”, American Banker: The Financial Services Daily, Jun. 4, 2003, New York, NY, 1 page. |
Lefebvre et al., “A Robust Soft Hash Algorithm for Digital Image Signature”, International Conference on Image Processing 2:11 (ICIP), vol. 3, Oct. 2003, pp. 495-498. |
LifeLock, “How LifeLock Works,” http://www.lifelock.com/lifelock-for-people printed Mar. 14, 2008 in 1 page. |
LifeLock, “LifeLock Launches First ID Theft Prevention Program for the Protection of Children,” Press Release, Oct. 14, 2005, http://www.lifelock.com/about-us/press-room/2005-press-releases/lifelock-protection-for-children. |
LifeLock; “How Can LifeLock Protect My Kids and Family?” http://www.lifelock.com/lifelock-for-people/how-we-do-it/how-can-lifelock-protect-my-kids-and-family printed Mar. 14, 2008 in 1 page. |
LifeLock, “Personal Identity Theft Protection & Identity Theft Products,” http://www.lifelock.com/lifelock-for-people, accessed Nov. 5, 2007. |
LifeLock, Various Pages, www.lifelock.com/, 2007. |
My Call Credit http://www.mycallcredit.com/products.asp?product=ALR dated Dec. 10, 2005 on www.archive.org. |
My Call Credit http://www.mycallcredit.com/rewrite.asp?display=faq dated Dec. 10, 2005 on www.archive.org. |
MyReceipts, http://www.myreceipts.com/, printed Oct. 16, 2012 in 1 page. |
MyReceipts—How it Works, http://www.myreceipts.com/howItWorks.do, printed Oct. 16, 2012 in 1 page. |
National Alert Registry Launches RegisteredOffendersList.org to Provide Information on Registered Sex Offenders, May 16, 2005, pp. 2, http://www.prweb.com/printer/240437.htm accessed on Oct. 18, 2011. |
National Alert Registry Offers Free Child Safety “Safe From Harm” DVD and Child Identification Kit, Oct. 24, 2006. pp. 2, http://www.prleap.com/pr/53170 accessed on Oct. 18, 2011. |
National Alert Registry website titled, “Does a sexual offender live in your neighborhood”, Oct. 22, 2006, pp. 2, http://web.archive.org/wb/20061022204835/http://www.nationallertregistry.com/ accessed on Oct. 13, 2011. |
OGG, Erica, “Apple Cracks Down on UDID Use”, http://gigaom.com/apple/apple-cracks-down-on-udid-use/ printed Nov. 5, 2012 in 5 Pages. |
Organizing Maniac's Blog—Online Receipts Provided by MyQuickReceipts.com, http://organizingmaniacs.wordpress.com/2011/01/12/online-receipts-provided-by-myquickreceipts.com/ dated Jan. 12, 2011 printed Oct. 16, 2012 in 3 pages |
Pagano, et al., “Information Sharing in Credit Markets,” Dec. 1993, The Journal of Finance, vol. 48, No. 5, pp. 1693-1718. |
Partnoy, Frank, Rethinking Regulation of Credit Rating Agencies: An Institutional Investor Perspective, Council of Institutional Investors, Apr. 2009, pp. 21. |
Planet Receipt—Home, http://www.planetreceipt.com/home printed Oct. 16, 2012 in 1 page. |
Planet Receipt—Solutions & Features, http://www.planetreceipt.com/solutions-features printed Oct. 16, 2012 in 2 pages. |
Press Release—“Helping Families Protect Against Identity Theft—Experian Announces FamilySecure.com; Parents and guardians are alerted for signs of potential identity theft for them and their children; product features an industry-leading $2 million guarantee”; PR Newswire; Irvine, CA; Oct. 1, 2007. |
Privacy Rights Clearinghouse, “Identity Theft: What to do if it Happens to You,” http://web.archive.org/web/19990218180542/http://privacyrights.org/fs/fs17a.htm printed Feb. 18, 1999. |
Quinn, Tom, “Low Credit Inquiries Affect Your Credit Score”, Credit.com, May 2, 2011, pp. 2. |
Rivera, Barbara, “New Tools for Combating Income Tax Refund Fraud”, https://gcn.com/Articles/2014/05/08/Insight-tax-fraud-tools.aspx?Page=1, May 8, 2014, pp. 3. |
Scholastic Inc.:Parent's Request for Information http://web.archive.org/web/20070210091055/http://www.scholastic.com/inforequest/index.htm as archived Feb. 10, 2007 in 1 page. |
Scholastic Inc.:Privacy Policy http://web.archive.org/web/20070127214753/http://www.scholastic.com/privacy.htm as archived Jan. 27, 2007 in 3 pages. |
ShoeBoxed, https://www.shoeboxed.com/sbx-home/ printed Oct. 16, 2012 in 4 pages. |
Singletary, Michelle, “The Littlest Victims of ID Theft”, The Washington Post, The Color of Money, Oct. 4, 2007. |
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, Retail Banker International, Jul. 24, 2007, pp. 4. |
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, Experian: Decision Analytics, Dec. 18, 2007, pp. 24. |
Sumner, Anthony, “Tackling the Issue of Bust-Out Fraud”, e-News, Experian: Decision Analytics, pp. 4, [Originally Published in Retail Banker International Magazine Jul. 24, 2007]. |
TheMorningCall.Com, “Cheap Ways to Foil Identity Theft,” www.mcall.com/business/columnists/all-karp.5920748jul01,0 . . . , published Jul. 1, 2007. |
“TransUnion—Child Identity Theft Inquiry”, TransUnion, http://www.transunion.com/corporate/personal/fraudIdentityTheft/fraudPrevention/childIDInquiry.page as printed Nov. 5, 2009 in 4 pages. |
Truston, “Checking if your Child is an ID Theft Victim can be Stressful,” as posted by Michelle Pastor on Jan. 22, 2007 at http://www.mytruston.com/blog/credit/checking_if_your_child_is_an_id_theft_vi.html. |
Vamosi, Robert, “How to Handle ID Fraud's Youngest Victims,” Nov. 21, 2008, http://news.cnet.com/8301-10789_3-10105303-57.html. |
Webpage printed out from http://www.jpmorgan.com/cm/ContentServer?c=TS_Content&pagename=jpmorgan%2fts%2FTS_Content%2FGeneral&cid=1139403950394 on Mar. 20, 2008, Feb. 13, 2006, New York, NY. |
Wilson, Andrea, “Escaping the Alcatraz of Collections and Charge-Offs”, http://www.transactionworld.net/articles/2003/october/riskMgmt1.asp, Oct. 2003. |
International Search Report and Written Opinion for Application No. PCT/US2007/06070, dated Nov. 10, 2008. |
International Search Report and Written Opinion for Application No. PCT/US2008/064594, dated Oct. 30, 2008. |
International Preliminary Report and Written Opinion in PCT/US2008/064594, dated Dec. 10, 2009. |
International Search Report and Written Opinion for Application No. PCT/US09/37565, dated May 12, 2009. |
Official Communication in Australian Patent Application No. 2012217565, dated May 12, 2017. |
Official Communication in Canadian Patent Application No. 2,827,478, dated Jun. 29, 2017. |
Official Communication in Canadian Patent Application No. 2,827,478, dated May 31, 2018. |
Extended European Search Report for Application No. EP12747205, dated Sep. 25, 2014. |
Supplementary European Search Report for Application No. EP12747205, dated Jun. 19, 2015. |
International Search Report and Written Opinion for Application No. PCT/US2012/025456, dated May 21, 2012. |
International Preliminary Report on Patentability in Application No. PCT/US2012/025456, dated Aug. 21, 2013. |
International Search Report and Written Opinion for Application No. PCT/US2011/033940, dated Aug. 22, 2011. |
Extended European Search Report for Application No. EP18207755, dated Dec. 13, 2018. |
Official Communication in Canadian Patent Application No. 2,827,478, dated Mar. 27, 2019. |
Official Communication in Australian Patent Application No. 2019279982, dated Dec. 19, 2019. |
Number | Date | Country | |
---|---|---|---|
62586014 | Nov 2017 | US |