Browse Prior Art Database

Reversal of Identity Theft through Creation of Substitute Identity

IP.com Disclosure Number: IPCOM000243060D
Publication Date: 2015-Sep-10
Document File: 2 page(s) / 26K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed are a system and method to combat electronic identity theft. The solution is to create an arbitrary set of one or more secure identifiers or identity tokens that are assigned to a single, securely identified individual, who can then use the tokens to confirm personal identity with or without the use of the (original) stolen identification numbers or tokens.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 51% of the total text.

Page 01 of 2

Reversal of Identity Theft through Creation of Substitute Identity

A system and method is needed to combat the thread of electronic identify theft. Without some means of disambiguation between valid identity information provided by the original owners, and the same information provided by a malignant third party (i.e. hackers), the hacker's impersonation of the original owner's identity is impossible to prevent.

The novel solution is a system and method to create an arbitrary set of one or more secure identifiers or identity tokens that are assigned to a single, securely identified individual. The primary owner of the identity can use the secure identifiers/tokens to confirm personal identity with or without, the use of the (original) stolen identification numbers or tokens.

The approach is similar to the manner in which a user receives a new Automatic Teller Machine (ATM) Personal Identification Number (PIN) through the securely identified address of a bank account. The novel system communicates the new arbitrary set of one or more secure identifiers through secure and confidential routing to the owner of the original identity. The main components and process for implementation follow:

1. A central, securely managed, online database stores the original identity information of hacked clients from one or more unconnected hacking attempts

2. A programmatically driven algorithm creates substitute identity tokens for each original hacked identity token. The replacement token need not be the same format, character set, or length as the original token.

For example, a nine-digit Social Security Number (SSN) can be assigned a substitute token...