WO2001031483A2 - A system and method for verifying on-line information presented by internet users - Google Patents
A system and method for verifying on-line information presented by internet users Download PDFInfo
- Publication number
 - WO2001031483A2 WO2001031483A2 PCT/US2000/029199 US0029199W WO0131483A2 WO 2001031483 A2 WO2001031483 A2 WO 2001031483A2 US 0029199 W US0029199 W US 0029199W WO 0131483 A2 WO0131483 A2 WO 0131483A2
 - Authority
 - WO
 - WIPO (PCT)
 - Prior art keywords
 - line user
 - information
 - user
 - application
 - line
 - Prior art date
 
Links
Classifications
- 
        
- H—ELECTRICITY
 - H04—ELECTRIC COMMUNICATION TECHNIQUE
 - H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
 - H04L63/00—Network architectures or network communication protocols for network security
 - H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
 - H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
 
 - 
        
- G—PHYSICS
 - G06—COMPUTING OR CALCULATING; COUNTING
 - G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
 - G06Q30/00—Commerce
 - G06Q30/02—Marketing; Price estimation or determination; Fundraising
 
 
Definitions
- the present invention relates to a system and method for verifying on-line information, and more particularly, to a system and method for using a multi -layered identification scheme to identify Internet users.
 - a page of information on the Web may include references to other Web pages and may include a broad range of multimedia data including textual, graphical, audio, and animation information.
 - Internet users retrieve information from the Internet, through the Web, by 'visiting' a web site on a computer that is connected to the Internet.
 - the web site is, in general terms, a server application that displays information stored on a network server computer.
 - the web site accepts connections from client programs, such as Internet browser applications.
 - Browser applications such as Microsoft Internet Explorer TM or Netscape Navigator TM, allow Internet users to access information displayed on the web site. Most browser applications display information on computer screens and permit a user to navigate through the Web using a mouse.
 - Web browsing uses the client-server paradigm.
 - URL Uniform Resource Locator
 - the browser application becomes a client and it contacts a server application specified in the URL to request the document.
 - the browser application displays the document for the user.
 - the two applications follow the HyperText Transport Protocol (HTTP).
 - HTTP HyperText Transport Protocol
 - HTTP allows the browser application to request a specific article, which the server application then returns.
 - HTTP defines the exact format for requests sent from the browser application to the server application as well as the format of replies that the server application returns.
 - CSP Customer Stock Plan
 - the system accurately links anonymous Internet users to a real world address by using a multi-layered authentication process.
 - the authentication process includes a normalization component, a reflexive check component, an internal check component, a cross-reference check component, and a physical location check component.
 - the normalization component checks that all required fields have been filled out in the proper format.
 - the reflexive check component checks that values and formats of predetermined data elements are correct by using predefined rules.
 - the internal check component validates the information entered by the user against information previously entered by other users.
 - the cross-reference check component uses third party and external data sources to determine whether multiple data elements are valid when considered together.
 - the physical location check component binds the information given by the user to a physical address, thereby accurately confirming a user's identity. Since there is cost associated with processing each component, the inventive system performs the checks in a predefined order to accurately and efficiently authenticate information presented by the user while minimizing cost.
 - the user Upon selecting to participate in the CSP or another on-line purchase/reward plan, the user is directed to a web site utilizing the inventive system.
 - the user may be directed to a third party's web site.
 - the inventive system web site or the third party's web site is used to collect personal information from the user and to provide access to other investment information.
 - the authentication process requires the user to enter personal and financial information.
 - the authentication process then normalizes the information collected from the user into a standardized format for manipulation by the system.
 - the authentication process verifies the user's address and other personal information using information obtained from third parties.
 - the system requires the user to call from a previously specified phone number to activate the assigned account.
 - the authentication component verifies the calling phone number used by the Internet user against the calling telephone's phone number as supplied by Automatic Number Identification (ANI), thus binding the user to a specific place and time.
 - ANI Automatic Number Identification
 - the present invention provides a system for using a multi-layer identity verification scheme by linking the on-line user to a physical address when the on-line user fills out an application on the system, the system comprising: a normalization component for ensuring that the user fills out all required fields in the application and for checking that all required fields have been filled out in proper formats; a reflexive check component for using predefined rules to validate that structures and values of predetermined data elements in the application are correct; an internal check component for comparing the information entered by the on-line user against information entered by previous on-line users; a cross-reference check component for determining whether multiple data elements are valid when considered against an external data source; and a physical location component for binding and verifying certain information given by the user to a physical address.
 - the present invention also provides a system for using a multi-layer identity verification scheme by linking the on-line user to a physical address when the on-line user fills out an application on the system, the system comprising: a plurality of components for ensuring that the user fills out all required fields in the application, for checking that all required fields have been filled out in proper formats, for using predefined rules to validate that structures and values of predetermined data elements in the application are correct, for comparing the information entered by the on-line user against information entered by previous on-line users, for determining whether multiple data elements are valid when considered against an external data source; and for binding and verifying certain information given by the user to the physical address; and means for executing the each of the plurality of components in a predefined order to accurately and efficiently authenticate information presented by the user while minimizing cost
 - the present invention also provides a method for using a multi-layer identification scheme to identify an on-line user by linking the on-line user to a physical address when the on-line user fills out an application on a system, the method
 - the present invention also provides a system for using a multi-layer identification scheme to identify an on-line user by linking the on-line user to a physical address when the on-line user fills out an application on the system, the system comprising: a web page for enabling the on-line user to enter information in the application and means for submitting the entered information to a rules engine; means for checking that predefined information entered by the on-line user was not previously submitted by another user and for obtaining a certificate for the user; means, in a normalization component, for ensuring that the user fills out all required fields in the application in a proper format and normalizing information in the required fields; means, in a reflexive check component, for using a credit card verification algorithm to verify credit card information, for performing a cyclic redundancy check to determine a valid format for a bank routing number, and for validating the telephone number to determine whether the telephone number is associated with a standard residential telephone line; means, in an internal check component, for comparing the information entered by the on-line user against information entered by previous
 - Fig. 1 illustrates a computer network in which the inventive system may be incorporated;
 - Fig. 2 illustrates the TCP/IP Layering Model Protocol used during communications between components on the computer network
 - Fig. 3 illustrates a rules engine for performing checks on information supplied by a subscriber of the system
 - Fig. 4 illustrates the information that an investor is required to enter to purchase stock on-line
 - Fig. 5 illustrates how the normalization component normalizes all information entered by the investor
 - Fig. 6 illustrates the steps implemented by reflexive check component
 - Fig. 7 illustrates the steps implemented by internal check component
 - Fig. 8 illustrates the steps implemented by cross-reference check component
 - Fig. 9 illustrates the steps implemented by the ANI check.
 - Fig. 1 is an example of a local area network (LAN) 100 that is configured to utilize a non-repudiation protocol.
 - LAN 100 comprises a server 102, four computer systems 104- 110, and peripherals, such as printers and other devices 112, that may be shared by components on LAN 100.
 - Computer systems 104-110 may serve as clients for server 102 and/or as clients and/or servers for each other and/or for other components connected to LAN 100.
 - Components on LAN 100 are preferably connected together by cable media, for example copper or fiber-optic cable and the network topology may be a token ring topology 114. It should be apparent to those of ordinary skill in the art that other media, for example, wireless media, such as optical and radio frequency, may also connect LAN 100 components. It should also be apparent that other network topologies, such as Ethernet, may be used. Data may be transferred between components on LAN 100 in packets, i.e., blocks of data that are individually transmitted over LAN 100. Routers 120, 122 create an expanded network by connecting LAN 100 to other computer networks, such as the Internet, other LANs or Wide Area Networks (WAN).
 - cable media for example copper or fiber-optic cable and the network topology may be a token ring topology 114.
 - other media for example, wireless media, such as optical and radio frequency
 - network topologies such as Ethernet
 - Data may be transferred between components on LAN 100 in packets, i.e., blocks of data that are individually transmitted over
 - Routers are hardware devices that may include a conventional processor, memory, and separate I/O interface for each network to which it connects. Hence, components on the expanded network may share information and services with each other. In order for communications to occur between components of physically connected networks, all components on the expanded network and the routers that connect them must adhere to a standard protocol. Computer networks connected to the Internet and to other networks typically use TCP/IP Layering Model Protocol. It should be noted that other internetworking protocols may be used.
 - TCP/IP Layering Model comprises an application layer (Layer 5) 202, a transport layer (Layer 4) 204, an Internet layer (Layer 3) 206, a network interface layer (Layer 2) 208, and a physical layer (Layer 1) 210.
 - Application layer protocols 202 specify how each software application connected to the network uses the network.
 - Transport layer protocols 204 specify how to ensure reliable transfer among complex protocols.
 - Internet layer protocols 206 specify the format of packets sent across the network as well as mechanisms used to forward packets from a computer through one or more routers to a final destination.
 - Network interface layer protocols 208 specify how to organize data into frames and how a computer transmits frames over the network.
 - Physical layer protocols 210 correspond to the basic network hardware.
 - Fig. 3 illustrates a rules engine 300 for performing checks on information supplied by a subscriber of the system.
 - Rules engine 300 includes a normalization component 302, a reflexive check component 304, an internal check component 306, a cross-reference check component 308, and a physical location check component 310.
 - Normalization component 302 is used to ensure that the subscriber has filled out required information fields and that the information in the required information fields is in the proper format.
 - Reflexive check component 304 uses predefined rules to validate structures of particular data elements in order to determine whether those data elements have been entered in the correct sequence.
 - Internal check component 306 uses information that was previously entered by other subscribers to determine whether an attempt is being made to impersonate another subscriber.
 - Cross-reference check component 308 uses external data sources to determine whether multiple data elements are valid when considered together.
 - Physical location check component 310 binds and verifies information given by the subscriber to a physical location. Since there is cost associated with performing each check in rules engine 300, the system performs the checks in a predefined order to accurately and efficiently verify information while minimizing cost. Thus, the checks that cost the least and are the most powerful in identifying valid and inaccurate information are utilized first. Specifically, in a preferred embodiment of the invention, when a subscriber registers with the system, the subscriber enters information into a user interface on a system web site and submits the information for on-line processing.
 - a subscriber/investor applying to purchase equity on-line directly from a public company is required to enter personal information on-line.
 - the present invention may be used to verify on-line information related to any activity where the identity of an on-line person needs to be verified.
 - Fig. 4 illustrates the information that an investor may be required to enter to purchase equity on-line.
 - the investor is required to enter a name, address, telephone number, e-mail address, credit card information, bank information and social security number.
 - the user may be required to enter other information to purchase equity on-line.
 - the system verifies that the social security number and bank account were not previously submitted by another investor and requests a certificate for the new investor.
 - the information is stored and rules engine 300 is called.
 - Rules engine 300 queries a database for fields used by components 302-310 to perform a series of checks and either accepts or rejects the registration application.
 - normalization component 302 normalizes all information entered by the investor so that the resulting data can be properly utilized by algorithms in rules engine 300. Normalization component 302 formats the information by checking that all fields have data. If a field is blank, normalization check component 302 rejects the registration application. Normalization component 302 then changes the street number, zip code, phone number, credit card number, checking account number, check routing number and social security number fields to integers, and removes non-integer characters. Other normalization schemes will be known to those of ordinary skill in the art, and are within the scope of the present invention.
 - reflexive check component 304 Upon normalizing, the information reflexive check component 304 processes the information.
 - Fig. 6 illustrates the steps implemented by reflexive check component 304.
 - reflexive check component 304 ensures that the requested information in the registration form has been filled out. If the requested information has not been provided, and the fields in the registration application are blank, the registration application is rejected.
 - reflexive check component 304 uses a credit card verification algorithm to check that the credit card number is in a valid format and to determine the type of credit card, such as VisaTM or MasterCardTM. If the credit card information fails this test, reflexive check component 304 rejects the registration application.
 - reflexive check component 304 also performs a cyclic redundancy check on the bank routing number from the user's check to determine if it is in a valid format. If the check routing number format is invalid, reflexive check component 304 rejects the registration application. Thereafter, in Step 6040, reflexive check component 304 compares the area code and prefix in the telephone number against a telephone company database. This enables reflexive check component 304 to determine whether the prefix is valid and whether it is contained within the area code entered, and to determine whether the telephone line associated with the telephone number is a standard residential phone line, as opposed to a PBX, cell phone, pager, etc. If the telephone line is not a standard residential line, component 304 rejects the registration application. In Step 6050, reflexive check component 304 forwards the information to internal check component 306.
 - Fig. 7 illustrates the steps implemented by internal check component 306.
 - internal check component 306 compares the investor's social security number, credit card number, checking account and routing number against the social security numbers, credit card numbers, checking accounts and routing numbers associated with active accounts in a system database. Each active account contains information supplied by other investors.
 - Step 7020 internal check component 306 rejects the registration application if the social security number, credit card number, or checking account and routing number combination is currently in the system database of active accounts. Internal check component 306 does not check the checking account against pending accounts in the database so that investors applying jointly at the same time can use the same account information. However, once an account becomes active, a new investor cannot use the same account information.
 - Step 7030 upon processing the information, internal check component 306 transmits the information to cross-reference check component 308.
 - Fig. 8 illustrates the steps implemented by cross-reference check component 308.
 - cross-reference check component 308 uses a census bureau zip code file and a conversion routine to convert the latitude/longitude of the centroid of the zip code to a telephone company coordinate system.
 - cross-reference check component 308 uses a telephone company database to look up the coordinates of a telephone switch indicated by the telephone area code and prefix.
 - cross-reference check component 308 then calculates the distance between the zip code and the telephone switch coordinates. The application is rejected if the distance is greater than a predefined threshold.
 - cross-reference check component 308 checks the available credit on the credit card and the application is rejected if there is insufficient funds on the credit card to pay for the processing fee.
 - cross-reference check component 308 uses the investor's social security number and an external database to verify and cross check the investor's name and address. The application is rejected if the name and address verification fails.
 - cross-reference check component 308 searches the investor's data in the database and evaluates any additional information on the investor, and then searches the additional information for predetermined codes indicating potentially fraudulent behavior. For example, predetermined codes may indicate a suspicious address or information, such as a social security number entered by the investor that belongs to a deceased person.
 - Cross-reference check component 308 rejects the application if there are certain suspicious information codes associated with the investor.
 - Rules engine 300 then constructs a bit vector showing the scoring results for each test. Certain bit patterns will cause the application to be rejected. If the application is not rejected, the investor's account is marked as pending and a request to credit the investor's credit card for the application-processing fee is created. The investor may now enter transactions. However, they will not be processed until the account status is changed to "approved”.
 - Fig. 9 illustrates the steps implement in performing physical location check 310.
 - the investor is sent an e-mail message instructing the investor to use his/her home telephone to call a specific number and to enter a pre-assigned personal identification number (PIN) contained in the e-mail.
 - PIN personal identification number
 - Step 9020 when the investor calls the identified number, the number of the phone being used by the investor is automatically retrieved with an automatic number identification component. The retrieved digits are temporarily stored in a buffer. Messages are then played instructing the investor to enter an activation code.
 - Step 9030 the automatic number identification component decodes the keypad presses and performs calculations to construct a database lookup code which retrieves the telephone number originally entered by the investor during the registration process from the investor's data in the database.
 - physical location check component 310 compares the telephone number in the database to the calling phone number in the buffer. If the calling phone number does not match the telephone number in the application, the investor is instructed to re-enter the activation number. If the numbers still do not match, the account is not activated.
 - Step 9050 if the telephone numbers match, rules engine 300 requests that the account is marked approved and the request for the application fee is processed. It should be noted that additional tests may also be used to further validate an individual's identity.
 
Landscapes
- Engineering & Computer Science (AREA)
 - Business, Economics & Management (AREA)
 - Strategic Management (AREA)
 - Finance (AREA)
 - Development Economics (AREA)
 - Accounting & Taxation (AREA)
 - Entrepreneurship & Innovation (AREA)
 - Computer Hardware Design (AREA)
 - Computer Networks & Wireless Communication (AREA)
 - General Engineering & Computer Science (AREA)
 - Computing Systems (AREA)
 - Computer Security & Cryptography (AREA)
 - Game Theory and Decision Science (AREA)
 - Signal Processing (AREA)
 - Economics (AREA)
 - Marketing (AREA)
 - Physics & Mathematics (AREA)
 - General Business, Economics & Management (AREA)
 - General Physics & Mathematics (AREA)
 - Theoretical Computer Science (AREA)
 - Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
 - Data Exchanges In Wide-Area Networks (AREA)
 
Abstract
Description
Claims
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title | 
|---|---|---|---|
| AU12254/01A AU1225401A (en) | 1999-10-22 | 2000-10-23 | A system and method for verifying on-line information presented by internet users | 
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title | 
|---|---|---|---|
| US16091499P | 1999-10-22 | 1999-10-22 | |
| US60/160,914 | 1999-10-22 | 
Publications (2)
| Publication Number | Publication Date | 
|---|---|
| WO2001031483A2 true WO2001031483A2 (en) | 2001-05-03 | 
| WO2001031483A3 WO2001031483A3 (en) | 2002-10-10 | 
Family
ID=22579006
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date | 
|---|---|---|---|
| PCT/US2000/029200 WO2001031536A2 (en) | 1999-10-22 | 2000-10-23 | A direct stock purchase system and method for implementing the same | 
| PCT/US2000/029199 WO2001031483A2 (en) | 1999-10-22 | 2000-10-23 | A system and method for verifying on-line information presented by internet users | 
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date | 
|---|---|---|---|
| PCT/US2000/029200 WO2001031536A2 (en) | 1999-10-22 | 2000-10-23 | A direct stock purchase system and method for implementing the same | 
Country Status (2)
| Country | Link | 
|---|---|
| AU (2) | AU1225401A (en) | 
| WO (2) | WO2001031536A2 (en) | 
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| WO2001086549A1 (en) * | 2000-05-08 | 2001-11-15 | Mci Worldcom, Inc. | A system and method for the verification of customer information entered via an internet based order entry system | 
| EP1938226A4 (en) * | 2005-09-28 | 2011-04-06 | Google Inc | Online data verification of listing data | 
| US8468129B2 (en) | 2011-09-23 | 2013-06-18 | Loyal3 Holdings, Inc. | Asynchronous replication of databases of peer networks | 
| US8533804B2 (en) | 2011-09-23 | 2013-09-10 | Loyal3 Holdings, Inc. | User login with redirect to home network | 
| US10440627B2 (en) | 2014-04-17 | 2019-10-08 | Twilio Inc. | System and method for enabling multi-modal communication | 
| US10469670B2 (en) | 2012-07-24 | 2019-11-05 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform | 
| US10560495B2 (en) | 2008-04-02 | 2020-02-11 | Twilio Inc. | System and method for processing telephony sessions | 
| US10694042B2 (en) | 2008-04-02 | 2020-06-23 | Twilio Inc. | System and method for processing media requests during telephony sessions | 
| US11386435B2 (en) | 2017-04-03 | 2022-07-12 | The Dun And Bradstreet Corporation | System and method for global third party intermediary identification system with anti-bribery and anti-corruption risk assessment | 
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US5790785A (en) * | 1995-12-11 | 1998-08-04 | Customer Communications Group, Inc. | World Wide Web registration information processing system | 
| US5684951A (en) * | 1996-03-20 | 1997-11-04 | Synopsys, Inc. | Method and system for user authorization over a multi-user computer system | 
| ES2619367T3 (en) * | 1998-05-21 | 2017-06-26 | Equifax Inc. | System and method for network user authentication | 
- 
        2000
        
- 2000-10-23 WO PCT/US2000/029200 patent/WO2001031536A2/en active Application Filing
 - 2000-10-23 WO PCT/US2000/029199 patent/WO2001031483A2/en active Application Filing
 - 2000-10-23 AU AU12254/01A patent/AU1225401A/en not_active Abandoned
 - 2000-10-23 AU AU12255/01A patent/AU1225501A/en not_active Abandoned
 
 
Cited By (29)
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| WO2001086549A1 (en) * | 2000-05-08 | 2001-11-15 | Mci Worldcom, Inc. | A system and method for the verification of customer information entered via an internet based order entry system | 
| US7089197B1 (en) | 2000-05-08 | 2006-08-08 | Mci, Llc | System and method for verification of customer information entered via an Internet based order entry system | 
| EP1938226A4 (en) * | 2005-09-28 | 2011-04-06 | Google Inc | Online data verification of listing data | 
| US11765275B2 (en) | 2008-04-02 | 2023-09-19 | Twilio Inc. | System and method for processing telephony sessions | 
| US11575795B2 (en) | 2008-04-02 | 2023-02-07 | Twilio Inc. | System and method for processing telephony sessions | 
| US12316810B2 (en) | 2008-04-02 | 2025-05-27 | Twilio Inc. | System and method for processing media requests during telephony sessions | 
| US12294677B2 (en) | 2008-04-02 | 2025-05-06 | Twilio Inc. | System and method for processing telephony sessions | 
| US10560495B2 (en) | 2008-04-02 | 2020-02-11 | Twilio Inc. | System and method for processing telephony sessions | 
| US10694042B2 (en) | 2008-04-02 | 2020-06-23 | Twilio Inc. | System and method for processing media requests during telephony sessions | 
| US11856150B2 (en) | 2008-04-02 | 2023-12-26 | Twilio Inc. | System and method for processing telephony sessions | 
| US10893079B2 (en) | 2008-04-02 | 2021-01-12 | Twilio Inc. | System and method for processing telephony sessions | 
| US10986142B2 (en) | 2008-04-02 | 2021-04-20 | Twilio Inc. | System and method for processing telephony sessions | 
| US11843722B2 (en) | 2008-04-02 | 2023-12-12 | Twilio Inc. | System and method for processing telephony sessions | 
| US11283843B2 (en) | 2008-04-02 | 2022-03-22 | Twilio Inc. | System and method for processing telephony sessions | 
| US11831810B2 (en) | 2008-04-02 | 2023-11-28 | Twilio Inc. | System and method for processing telephony sessions | 
| US11444985B2 (en) | 2008-04-02 | 2022-09-13 | Twilio Inc. | System and method for processing telephony sessions | 
| US11722602B2 (en) | 2008-04-02 | 2023-08-08 | Twilio Inc. | System and method for processing media requests during telephony sessions | 
| US11611663B2 (en) | 2008-04-02 | 2023-03-21 | Twilio Inc. | System and method for processing telephony sessions | 
| US11706349B2 (en) | 2008-04-02 | 2023-07-18 | Twilio Inc. | System and method for processing telephony sessions | 
| US8533804B2 (en) | 2011-09-23 | 2013-09-10 | Loyal3 Holdings, Inc. | User login with redirect to home network | 
| US8468129B2 (en) | 2011-09-23 | 2013-06-18 | Loyal3 Holdings, Inc. | Asynchronous replication of databases of peer networks | 
| US11063972B2 (en) | 2012-07-24 | 2021-07-13 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform | 
| US11882139B2 (en) | 2012-07-24 | 2024-01-23 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform | 
| US10469670B2 (en) | 2012-07-24 | 2019-11-05 | Twilio Inc. | Method and system for preventing illicit use of a telephony platform | 
| US11653282B2 (en) | 2014-04-17 | 2023-05-16 | Twilio Inc. | System and method for enabling multi-modal communication | 
| US10873892B2 (en) | 2014-04-17 | 2020-12-22 | Twilio Inc. | System and method for enabling multi-modal communication | 
| US12213048B2 (en) | 2014-04-17 | 2025-01-28 | Twilio Inc. | System and method for enabling multi-modal communication | 
| US10440627B2 (en) | 2014-04-17 | 2019-10-08 | Twilio Inc. | System and method for enabling multi-modal communication | 
| US11386435B2 (en) | 2017-04-03 | 2022-07-12 | The Dun And Bradstreet Corporation | System and method for global third party intermediary identification system with anti-bribery and anti-corruption risk assessment | 
Also Published As
| Publication number | Publication date | 
|---|---|
| AU1225501A (en) | 2001-05-08 | 
| WO2001031536A2 (en) | 2001-05-03 | 
| WO2001031536A8 (en) | 2002-08-29 | 
| WO2001031483A3 (en) | 2002-10-10 | 
| AU1225401A (en) | 2001-05-08 | 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| US7610216B1 (en) | Method and system for detecting fraud | |
| US7698217B1 (en) | Masking private billing data by assigning other billing data to use in commerce with businesses | |
| US8571975B1 (en) | System and method for sending money via E-mail over the internet | |
| US8650118B2 (en) | Universal merchant platform for payment authentication | |
| JP5638046B2 (en) | Method and system for authorizing purchases made on a computer network | |
| US8355959B2 (en) | Payment service capable of being integrated with merchant sites | |
| USRE43440E1 (en) | Method for performing a transaction over a network | |
| US7225156B2 (en) | Persistent dynamic payment service | |
| CA2950637C (en) | Universal merchant platform for payment authentication | |
| US8606719B2 (en) | System for management of alternatively priced transactions on network | |
| US20020133412A1 (en) | System for management of transactions on networks | |
| CN1437741A (en) | Authenticated payment | |
| KR20070007044A (en) | Multiple party benefit from an online authentication service | |
| EA005835B1 (en) | A secure on-line payment system | |
| US20030065727A1 (en) | Systems and methods for providing secured electronic messaging | |
| US20040068465A1 (en) | Electric commerce credit processing method and electric commerce system | |
| WO2001031483A2 (en) | A system and method for verifying on-line information presented by internet users | |
| US20030105723A1 (en) | Method and system for disclosing information during online transactions | |
| US20020133429A1 (en) | Multi-website shopping cart system and the method for the same | |
| US20020032575A1 (en) | System and method for responding to an inquiry in exchange for a resource over a communication network | |
| US10275780B1 (en) | Method and apparatus for sending a rebate via electronic mail over the internet | |
| KR20020044669A (en) | Method and system for a mortgage loan using internet | |
| WO2001059648A1 (en) | System for management of transactions on networks | |
| HK1166871A1 (en) | Payment system | |
| HK1166871B (en) | Payment system | 
Legal Events
| Date | Code | Title | Description | 
|---|---|---|---|
| AK | Designated states | 
             Kind code of ref document: A2 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW  | 
        |
| AL | Designated countries for regional patents | 
             Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG  | 
        |
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| REG | Reference to national code | 
             Ref country code: DE Ref legal event code: 8642  | 
        |
| AK | Designated states | 
             Kind code of ref document: A3 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG UZ VN YU ZA ZW  | 
        |
| AL | Designated countries for regional patents | 
             Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG  | 
        |
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established | 
             Free format text: COMMUNICATION PURSUANT TO RULE 85A(1) EPC (EPO FORM 1217N) DATED 16.01.03 COMMUNICATION PURSUANT TORULES 85A AND 85B EPC (EPO FORM 1218N) DAT  | 
        |
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established | 
             Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC EPO FORM 1205 DATED 27.08.03  | 
        |
| NENP | Non-entry into the national phase | 
             Ref country code: JP  | 
        |
| 122 | Ep: pct application non-entry in european phase |