LexisNexis Risk Solutions Inc. Patent applications |
Patent application number | Title | Published |
20160057146 | SYSTEMS AND METHODS FOR MULTI-STAGE IDENTITY AUTHENTICATION - Certain implementations of the disclosed technology may include systems and methods for multi-stage identity authentication. A method is provided that includes receiving a set of identity information associated with a subject and querying one or more public or private databases with at least a portion of the set of identity information. The method includes receiving independent information responsive to the querying. The method includes determining zero or more first indicators of fraud risk and producing one or more identity proofing queries derived from the independent information. Based at least in part on a comparison of the one or more proofing queries and a query response, the method includes determining zero or more second indicators of fraud risk and evaluating a fraud score. Responsive to evaluating the fraud score, the method includes initiating one or more of authentication enrollment and multi-factor authentication of the subject. | 02-25-2016 |
20160036807 | SYSTEMS AND METHODS FOR COMBINED OTP AND KBA IDENTITY AUTHENTICATION - Certain implementations include systems and methods for combined one-time-passcode (OTP) and knowledge-based-authentication (KBA) identity authentication. A method is provided that includes receiving a set of identity information associated with a subject; querying one or more databases; receiving personally identifiable information; producing at least one knowledge based authentication (KBA) identity proofing question having a personally identifiable correct answer; generating a unique correct one-time pass (OTP) code for the personally identifiable correct answer; generating one or more incorrect answers with corresponding incorrect codes; outputting, the at least one KBA identity proofing question; outputting the personally identifiable correct answer with the unique correct OTP code, and the one or more incorrect answers with corresponding incorrect codes; receiving a response code; comparing the response code and the unique correct OTP code; and responsive to a match between the response code and the unique correct OTP code, outputting a first indication of authentication. | 02-04-2016 |
20150379789 | SYSTEMS AND METHODS FOR TELEMATICS MONTORING AND COMMUNICATIONS - Certain example embodiments of the disclosed technology may include systems and methods for telematics monitoring. An example method is provided that includes receiving, at a mobile computing device, and from a Vehicle Identification Unit (VIU), identification (ID) data representing a first vehicle. The method further includes receiving, by the mobile computing device, sensor data from one or more sensors associated with the mobile computing device. Certain embodiments may further include receiving, at an Operational Measurement Unit (OMU), an operation indication associated with the first vehicle. The OMU may include an operational measurement component configured to advance an operational count in response to receiving the operation indication. Certain example embodiments may include transmitting telematics data by the mobile computing device. In certain embodiments, the telematics data may include least a portion of one or more of the ID data, the sensor data, and/or the operational count data. | 12-31-2015 |
20150373188 | SYSTEMS AND METHODS FOR SCORING PHONE NUMBERS - Certain implementations of the disclosed technology include systems and methods for determining a reachability score of a phone number. A method includes receiving personally identifiable information associated with the subject; querying one or more public or private databases with the personally identifiable information; receiving, in response to the querying, phone number information related to the personally identifiable information; extracting, from the phone number information, one or more phone numbers associated with the subject; determining, with one or more computer processors, based at least in part on the one or more phone numbers, a phone type corresponding to the respective one or more phone numbers; determining, with the one or more computer processors, a reachability score for at least one of the one or more phone numbers, wherein the reachability score is based, at least in part, on the phone type; and outputting an indication of the reachability score | 12-24-2015 |
20150365388 | SYSTEMS AND METHODS FOR MULTI-STAGE IDENTITY AUTHENTICATION - Certain implementations of the disclosed technology may include systems and methods for multi-stage identity authentication. A method is provided that includes receiving a set of identity information associated with a subject and querying one or more public or private databases with at least a portion of the set of identity information. The method includes receiving independent information responsive to the querying. The method includes determining zero or more first indicators of fraud risk and producing one or more identity proofing queries derived from the independent information. Based at least in part on a comparison of the one or more proofing queries and a query response, the method includes determining zero or more second indicators of fraud risk and evaluating a fraud score. Responsive to evaluating the fraud score, the method includes initiating one or more of authentication enrollment and multi-factor authentication of the subject. | 12-17-2015 |
20150348187 | SYSTEMS AND METHODS FOR DETERMINING OCCUPANCY - Certain implementations may include systems and methods for determining occupancy. According to an example implementation, a method is provided. The method includes receiving identifying information related to occupancy of a target property by a subject. The identifying information may include a name of the subject and an address of the target property. In certain embodiments, the identifying information may include an actual or approximate investigation date to allow a historical evaluation of occupancy at a specific time in the past. The method includes querying one or more public or private databases with the identifying information and receiving, in response to the querying, subject and property information. The method includes determining one or more indicators of occupancy of the target property. The method includes determining, with the one or more computer processors, a score based on the one or more indicators of occupancy; and outputting an indication of the score. | 12-03-2015 |
20150326712 | SYSTEMS AND METHODS FOR SCORING PHONE NUMBERS - Certain implementations of the disclosed technology include systems and methods for determining a reachability score of a phone number. A method includes receiving personally identifiable information associated with the subject; querying one or more public or private databases with the personally identifiable information; receiving, in response to the querying, phone number information related to the personally identifiable information; extracting, from the phone number information, one or more phone numbers associated with the subject; determining, with one or more computer processors, based at least in part on the one or more phone numbers, a phone type corresponding to the respective one or more phone numbers; determining, with the one or more computer processors, a reachability score for at least one of the one or more phone numbers, wherein the reachability score is based, at least in part, on the phone type; and outputting an indication of the reachability score | 11-12-2015 |
20130311209 | TELEMATICS SMART PINGING SYSTEMS AND METHODS - Monitoring systems and methods are configured to determine a pattern of vehicle usage or to verify personal data about a vehicle insurance applicant, without unreasonable expense to an insurance provider or the applicant. A monitoring system can track movements of a handheld mobile communication device, and can include a personal data unit, a communication unit, and an analysis unit. The personal data unit can receive personal data about the insurance applicant, including an identifier of a mobile communication device used by the insurance applicant. The communication unit can receive location data describing various locations of the mobile communication device. | 11-21-2013 |
20130190967 | SYSTEMS AND METHODS FOR TELEMATICS MONTORING AND COMMUNICATIONS - Certain example embodiments of the disclosed technology may include systems and methods for telematics monitoring. An example method is provided that includes receiving, at a mobile computing device, and from a Vehicle Identification Unit (VIU), identification (ID) data representing a first vehicle. The method further includes receiving, by the mobile computing device, sensor data from one or more sensors associated with the mobile computing device. Certain embodiments may further include receiving, at an Operational Measurement Unit (OMU), an operation indication associated with the first vehicle. The OMU may include an operational measurement component configured to advance an operational count in response to receiving the operation indication. Certain example embodiments may include transmitting telematics data by the mobile computing device. In certain embodiments, the telematics data may include least a portion of one or more of the ID data, the sensor data, and/or the operational count data. | 07-25-2013 |
20120209632 | TELEMATICS SMART PINGING SYSTEMS AND METHODS - Monitoring systems and methods are configured to determine a pattern of vehicle usage or to verify personal data about a vehicle insurance applicant, without unreasonable expense to an insurance provider or the applicant. A monitoring system can track movements of a handheld mobile communication device or rely on an application installed on said device, and can include a personal data unit, a communication unit, and an analysis unit. The personal data unit can receive personal data about the insurance applicant, including an identifier of a mobile communication device used by the insurance applicant. | 08-16-2012 |
20120191481 | TELEMATICS SMART PINGING SYSTEMS AND METHODS - Monitoring systems and methods are configured to determine a pattern of vehicle usage or to verify personal data about a vehicle insurance applicant, without unreasonable expense to an insurance provider or the applicant. A monitoring system can track movements of a handheld mobile communication device, and can include a personal data unit, a communication unit, and an analysis unit. The personal data unit can receive personal data about the insurance applicant, including an identifier of a mobile communication device used by the insurance applicant. The communication unit can receive location data describing various locations of the mobile communication device. The analysis unit can analyze the location data to determine a level of risk for insuring the entity, based at least partially on movements of the mobile communication device indicated by the location data. | 07-26-2012 |