Silent alarms for economic duress

ABSTRACT

Apparatus and methods for providing protection from economic exploitation. The apparatus and methods may include a platform for tagging a social security number and/or other suitable identification number. The system may allow a person associated with a social security number to automatically flag and deny any product or service request associated with the social security number. The alarms are “silent,” because the alarm may initiate an institution internal process in which the customer interaction with the institution follows a normal evaluation process until an intervention can be effectively executed on behalf of the customer. This reduces the likelihood of a reaction from the customer&#39;s associate prior to completing the evaluation process. A system may provide the customer with an opportunity to electronically activate an alarm by typing keystrokes on a card reader keypad or interacting with a physical sensor on the reader, on the card, or the like.

BACKGROUND

Access to products and services typically requires the performance ofinstitutional evaluation on the part of a vendor. The evaluationincludes verifying the identity of an individual who requests theproducts or services. The evaluation may also include verification ofthe individual's resources. Individuals may misrepresent value of theresources in connection with the request. Individuals may purport to be,or to make such a request on behalf of, a second individual who isbetter positioned to prove possession of assets than is the firstindividual. Electronic commerce and communication infrastructure haveprovided inexpensive and easily accessible opportunities to requestproducts and services, and have made obtaining proof of the resources,and providing them to the vendor, easy. However, electronic commerce andcommunication infrastructure have made it easier for individuals to makemisrepresentations about their resources and about their authority toact on behalf of others, or to pose as others. Intervention in theimproper activities of such individuals benefits from proper timing toavoid injury to those being exploited.

Therefore, it would be desirable to provide apparatus and methods forcontrolling flow of products and services between a customer and avendor to mitigate deceptive or exploitive practices that may includeimpersonation, coercion or force of legitimate customers or prospectivecustomers.

BRIEF DESCRIPTION OF THE DRAWINGS

The objects and advantages of the disclosure will be apparent uponconsideration of the following detailed description, taken inconjunction with the accompanying drawings, in which like referencecharacters refer to like parts throughout, and in which:

FIG. 1 shows illustrative apparatus that may be used in accordance withprinciples of the invention.

FIG. 2 shows illustrative apparatus that may be used in accordance withprinciples of the invention.

FIG. 3 shows illustrative apparatus in accordance with principles of theinvention.

FIG. 4 shows illustrative apparatus in accordance with principles of theinvention.

FIG. 5 shows illustrative apparatus in accordance with principles of theinvention.

FIG. 6 shows illustrative apparatus in accordance with principles of theinvention.

FIG. 7 shows illustrative apparatus in accordance with principles of theinvention.

FIG. 8 shows illustrative apparatus in accordance with principles of theinvention.

FIG. 9 shows illustrative apparatus in accordance with principles of theinvention.

FIG. 10 shows illustrative apparatus in accordance with principles ofthe invention, in a partial cross-sectional view that corresponds tothat taken along lines 10-10 in FIG. 9.

FIG. 11 shows illustrative steps of processes in accordance withprinciples of the invention.

FIG. 12 shows illustrative steps of processes in accordance withprinciples of the invention.

FIG. 13 shows illustrative steps of processes in accordance withprinciples of the invention.

FIG. 14 shows illustrative steps of processes in accordance withprinciples of the invention.

DETAILED DESCRIPTION

Apparatus and methods for providing protection from economicexploitation are provided.

“Economic exploitation” encompasses a spectrum of societal ills in whicha legitimate consumer, the consumer's assets, credit, reputation, andthe like, usually legitimately earned and cultivated, are used by apredator to gain access to goods and services to which the predator hasno intrinsic ownership or control, or no legal rights to access orencumber.

This may include a domestic violence situation, for example. Thecustomer may need to alert a vendor of the goods and services that ifthe customer's my social security number is used in a request for thegoods and services, the vendor should automatically reject the request.This may prevent the customer from unwillingly or unwittingly beingburdened with liability—for example a loan, or a series of loans.

The alert may be communicated to law enforcement, who may participate inanalysis of the exploitation, and, if appropriate, intervention.

In one hypothetical scenario, a woman and man come to the vendortogether for loan application. The apparatus and methods may permit thecouple to to go through the process, but the loan may be denied loanwithout any additional checks or controls, and certainly before openingthe loan account. Vendor personnel may pretend that the couple canpursue the loan through the evaluation process. The vendor may refrainfrom triggering any additional questions of the couple. This may preventthe triggering of additional violence. However, the vendor wouldannotate the vendor's records to indicate that the woman was in adomestic violence situation. The record may be used in evaluation of asubsequent loan application by the customer to show a pattern ofexploitation, and, in the subsequent application, increase scrutiny forpossible exploitation, and perhaps intensify or accelerate intervention.

The customer may use a transaction instrument such as an informationcard, a mobile communication device, a cell phone, or the like to alertthe vendor of an issue.

When the request is made on a website, the download of a request form,such as an application, could itself be a trigger to alert the vendor.If the customer then includes in the form a predetermined data element,such as a social security number, and submits the form, the submissionof that specific data element could then trigger the communication ofthe alert to the vendor, an intervention party, or both.

The apparatus and methods may provide a new paradigm for security—openan account only after possible triggering of an exploitation alert, anddo so silently—without explanation that might provoke aggression of thepredator against the customer.

The apparatus and methods may include providing an opportunity for thecustomer to opt-in to an alerting system. The system may electronicallyquery the customer after an alarm is triggered. The customer may click abutton on a mobile device. The click may indicate, “Yes, I need help,”or, “No, this is OK.” The button may include a biometrically-basedsignal. This may prevent the predator for impersonating the customer toopt out or circumvent the alert system.

The apparatus and methods may include a platform for tagging a socialsecurity number and/or other suitable identification number. The systemmay preventively allow a person associated with a social security numberto automatically flag and deny any product or service request associatedwith the social security number. The denial may be permanent, temporary,or for a predetermined period of time. The denial may be conditionedupon further evaluation during the evaluation process. The period oftime may be conditioned upon further evaluation during the evaluationprocess.

Detection of the customer's entry of the customer's social securitynumber in the request may trigger an alert on the mobile device of theperson. The alert may request additional information. The alert maynotify the person about the request.

The platform may initiate a security check prior to initiation of anevaluation process upon which the provision of the product or service isconditioned. The platform may send the social security number to anintervention party. The platform may send the social security number toan investigative party to evaluate facts related to possible coercion.The investigative party may be part of the institution providing theproduct or services. The investigative party may be a third party. Theinvestigative party may be part of a law enforcement agency. Theinvestigative party may electronically search records, including policerecords that may name the person or an associate of the personpurporting to act on behalf of the person. The fact of multiple attemptsto obtain the product or services using the person's social security maybe used to trigger transmission of a notice to a law enforcement agency.

“Evaluation” may include any process in which an offeror of the productor service receives information a customer, prospective customer,applicant, inquirer or other individual in contemplation of providing tothe individual the product or services. Evaluation may include adiligence process, an analytical process, a background check process, anasset assessment process, a liability assessment process, or any othersuitable process. The platform may direct that the person biometricallyauthenticate the person's identity. The platform may direct that theperson physically appear to participate in the evaluation process.

Predators have different modi operandi. Some impersonate the customeronline. Some impersonate the customer by telephone. Some predatorsrequest of the vendor a new service such as a credit card, a loan, amortgage, and the like. Some predators request a cash advance. Somepredators request use the customer's credit account to make transactionsuntil a credit limit is reached. Some predators request a secondmortgage using the customer's asset as collateral. Some predators usephysical or psychological force on the customer.

The apparatus and methods may include native-feature, card-reader-based,customer-triggered silent alarms for alerting an institution that aninteraction between a customer, or a customer's associate purporting toact on behalf of the customer, is being carried out under duress orcoercion. When the customer authenticates to the institution byinserting an information card into a reader, the reader may provide thecustomer with an opportunity to activate the alarm by typing keystrokesinto the reader. The keystrokes may be preselected by the customer. Thekeystrokes may be displayed by the reader display. The keystrokes may bea sequence related to the customer's PIN. The silent alarm is “silent,”in that the alarm may be configured to initiate an institution internalprocess in which the customer interaction with the institution follows anormal trajectory until an intervention can be effectively executed onbehalf of the customer. This reduces the likelihood of a reaction fromthe customer's associate prior to completion of the interaction.

The apparatus and methods may include a custom card-reader-based,customer-triggered silent alarm for alerting the institution that theinteraction is being carried out under duress or coercion. When acustomer authenticates by inserting an information card into a reader,the reader may provide the customer with an opportunity to activate thealarm by instructing the customer to interact with a physical sensor onthe reader.

The apparatus and methods may include a custom on-card,customer-triggered silent alarm for alerting the institution that atransaction or application is being carried out under duress orcoercion. When a customer is authenticates to the institution byinserting an information card into a reader, the reader may provide thecustomer with an opportunity to activate the alarm by instructing thecustomer to interact with a circuit on the information card. The circuitmay include a contact on the card chip or an auxiliary circuit builtinto the card. The circuit may be disposed on the card in a locationthat is exposed outside the reader when the card is fully inserted intothe reader. The circuit may include a sensor that is downward-facing sothat the customer can activate the alarm without detection by anonlooker, such as the associate.

The apparatus and methods may include methods for controlling flow of aproduct between a customer and a vendor. “Product” may include“service.” The methods may include electronically granting a firstpermission, for interacting with a customer, to first institutionalrepresentatives. The methods may include electronically granting asecond permission, excluding interacting with the customer, to secondinstitutional representatives. The methods may include receiving from aparty a request for a product. Table 1, below, lists illustrativeproducts.

TABLE 1 Illustrative products Illustrative products Loan Credit cardCash advance Line of credit Checking account Savings account Brokerageaccount POS services account Custodial account Other suitable products

The request may name a customer. The request may identify the customerwith a social security number.

The methods may involve one or more processes. A process is defined ascomputer software that accumulates electronic records corresponding tofacts, figures, inquiries and conclusions, provides reports andsummaries regarding status of the records and unfulfilled requests forrecords, and notifies users about predetermined time-constraints onaccumulation of the records.

The methods may include initializing an electronic evaluation-processcorresponding to the request. The methods may include determining thatthe social security number is electronically flagged by the customer.The methods may include initializing an electronic trouble-mitigationprocess corresponding to the request. Records in the electronicevaluation process may be viewable under either of the first permissionand the second permission. Records in the electronic trouble-mitigationprocess may be records that are not viewable under the first permissionand viewable under the second permission.

The determining may include identifying the social security number in aregistry. The methods may include accessing the registry as aninstitutional user and not accessing the registry as an administrator ofthe registry.

The methods may include assigning to the evaluation process anevaluation timeline. The methods may include adding a series ofevaluation records to the evaluation process in conformance with thetimeline. The methods may include, during the adding, echoing anevaluation record from the evaluation process to the trouble-mitigationprocess.

The methods may include transmitting to a customer mobile communicationdevice an alert indicating initiation of the trouble-mitigation process.

The methods may include, trouble-mitigation process, adding to theevaluation process a record requiring biometric authentication of thecustomer. The source of a record corresponding to the requirement may beunidentifiable in the evaluation process by the first representatives.

The methods may include, from the trouble-mitigation process, adding tothe evaluation process a record requiring in-person attendance of thecustomer at a meeting with first representatives. The source of a recordcorresponding to the requirement being unidentifiable in the evaluationprocess by the first representatives.

The methods may include, from the trouble-mitigation process, adding tothe evaluation process a record requiring an electronic on-cardcommunication from the customer. The source of a record corresponding tothe requirement being unidentifiable in the evaluation process by thefirst representatives.

The methods may include providing to the customer a link to the socialsecurity number registry.

The determining may include authenticating an institution to theregistry.

The methods may include echoing a record from the evaluation process tothe trouble-mitigation process.

The methods may include transmitting a suspicious activity report to anintervention party.

Table 2, below, lists illustrative intervention parties.

TABLE 2 Illustrative intervention parties. Illustrative interventionparties On-file emergency contact Social service organization Legalservice organization Government agency Law enforcement Credit bureauFraud unit Other suitable parties

The methods may include electronically granting the second permission tothe intervention party.

The methods may include receiving a stop-process instruction from theintervention party.

The methods may include, from the trouble-mitigation process, adding tothe evaluation process a record including a stop-process instruction.The source of the record corresponding to the requirement may beunidentifiable in the evaluation process by the first representatives.

The methods may include denying the request.

The methods may include electronically searching public documents namingthe customer. The methods may include culling the documents based onindicia of economic exploitation. The methods may include entering intothe trouble-mitigation process a record corresponding to a culleddocument.

The request may be a current request that is received by a productvendor.

The methods may include identifying in an archive owned by the vendor arecord of a prior request naming the customer. The methods may includeentering into the trouble-mitigation process a record indicatinghistorical activity naming the customer.

The methods may include, in response to the historical activity,transmitting an electronic alert to an administrator authorized toobtain both the first and the second permission.

The methods may include identifying in an archive owned by the vendor arecord of a prior request naming an individual that is not the customer.The methods may include entering into the trouble-mitigation process arecord indicating historical activity naming the individual.

The apparatus and methods may include methods for controlling flow of aproduct between a customer and a vendor. The methods may includereceiving an Answer-to-Reset (“ATR”) response from an information card.Table 3 lists illustrative standards that involve answers-to-reset,communication between computers, card readers, cards, and the like.

TABLE 3 Illustrative standards Illustrative standards ISO 14443(Identification cards) ISO 18092/ECMA-340 ISO 21481/ECMA-352 ISO 7816PC/SC CCID Other suitable standards

The standards are hereby incorporated herein in their entireties.

Table 4 lists illustrative types of information cards.

TABLE 4 Illustrative information cards Illustrative information cardsIdentification card Smart card Chip card Mag stripe card Contact cardContactless card Payment card Other suitable cards

The methods may include using an off-card process, displaying on acard-accepting device an instruction to enter a user trouble-keysequence. A user may enter the trouble-key sequence to indicate atrouble condition. The trouble condition may be urgent. The troublecondition may be non-urgent. The methods may include receiving thetrouble code. The methods may include, in response to receiving thetrouble code, communicating to a back-end system a trouble code flag.The methods may include transmitting to the information card anapplication selection.

The trouble-key sequence may correspond to a duress condition. Theduress condition may be non-urgent. The trouble-key sequence maycorrespond to a panic condition. The panic condition may be urgent. Ifthe user indicates duress, the trouble-mitigation process may track theevaluation process without interfering with the evaluation process. Thismay allow intervention parties to engage in a first level of factgathering. If the user indicates panic, the trouble-mitigation processmay track the evaluation process, but may intervene in the evaluationprocess before completion of the evaluation process to protect the userfrom imminent harm.

The instruction may include both a duress element and a panic element.The instruction may include a first prompt for the user to provide afirst trouble key sequence to signal duress. The instruction may includea second prompt for the user to provide a second trouble key sequence tosignal panic.

The methods may include, using the off-card process providing thetrouble-key sequence to the information card. The methods may include,using the off-card process receiving from the smart-card a verificationof the trouble-key sequence.

The methods may include, after receiving the trouble code, engagingelectronically in an information card application selection negotiation.The methods may include verifying a customer identity. The methods mayinclude placing an electronic tag on an interaction between a reader andthe information card. The methods may include transmitting to an issuerback-end system the trouble flag and the tag.

The methods may include receiving at the back-end system the troubleflag and the tag. The methods may include using the tag to identify acustomer. The methods may include establishing a one-way viewport froman intervention process to subsequent transactions between a provider ofthe product and the customer. A viewport may be a logically definedviewport. A viewport may be defined by a logical permission to view adata record.

The methods may include initiating a search for publicly availablerecords corresponding to the customer. The methods may include reportingto a case manager results from the search. The methods may includeproviding to a law enforcement agency electronic access to the viewport.

The customer may be a first customer having a first risk profile. Therisk profile may be correlated statistically with another customer'srisk profile. The correlation may be based on behavioral attributes. Thebehavioral attributes may signify patterns of being subjected toeconomic exploitation. Table 5 lists illustrative attributes.

TABLE 5 Illustrative attributes. Illustrative attributes Identificationattributes Past intervention events Past co-signor participation inproduct applications Past bankruptcy Past payment to accounts namingothers Past cosigning with applicants implicated in acts of economicexploitation Public records indicating involvement in suspiciouseconomic activity Other suitable attributes

The viewport may be a first viewport. The methods may include providingto the law enforcement agency electronic access to a second viewportthat corresponds to a second customer having a second risk profile thatis correlated with the first risk profile.

The communicating may initiate an electronic trouble-mitigation process.The transmitting may initiate an electronic evaluation process.

The methods may include electronically granting a first permission, forinteracting with a customer, to first institutional representatives. Themethods may include electronically granting a second permission,excluding interacting with the customer, to second institutionalrepresentatives. Records in the electronic evaluation process may beviewable under either of the first permission and the second permission.Records in the electronic trouble-mitigation process may be records thatare not viewable under the first permission and are viewable under thesecond permission.

The methods may include assigning to the evaluation process anevaluation timeline. The methods may include adding a series ofevaluation records to the evaluation process in conformance with thetimeline. Table 6 lists illustrative evaluation records.

TABLE 6 Illustrative evaluation records. Illustrative evaluation recordsCash on Hand & in banks Accounts Payable Savings Accounts Notes Payableto Banks and Others IRA or Other Retirement Account Installment Account(Auto) Accounts & Notes Receivable Life Insurance - Cash Surrender ValueLoan(s) Against Life Insurance Stocks and Bonds Mortgages on Real EstateReal Estate Unpaid Taxes Automobiles Other Liabilities Other PersonalProperty Salary Loans, as Endorser or Co-Maker Net Investment IncomeLegal Claims & Judgments Real Estate Income Other suitable evaluationrecords

The methods may include, during the adding, echoing an evaluation recordfrom the evaluation process to the trouble-mitigation process.

The methods may include transmitting a suspicious activity report to anintervention.

The methods may include electronically granting the second permission tothe intervention party.

The methods may include receiving a stop-process instruction from theintervention party.

The methods may include, from the trouble-mitigation process, adding tothe evaluation process a record including a stop-process instruction.The source of the record corresponding to the requirement may beunidentifiable in the evaluation process by the first representatives.

The methods may include receiving from the information card atransaction certificate. The transaction certificate may include anapplication protocol data unit (“ADPU”) transaction certificate (“TC”)message.

The apparatus and methods may include apparatus for card acceptance. Theapparatus may include a card acceptance device. The card may be aninformation card.

The apparatus may include a numerical key pad. The pad may include oneor more keys corresponding, respectively, to numerals 0, 1, 2, 3, 4, 56, 7, 8 and 9. The apparatus may include a pound key (“#”). Theapparatus may include a star key (“*”). The apparatus may include anENTER key. The apparatus may include a CANCEL key. The apparatus mayinclude a trouble key. The trouble key may be exclusively fortransmitting a trouble flag. The apparatus may include an off-cardmicroprocessor configured to sense an activation of a key of the keys.The apparatus may include an operating system for the off-cardmicroprocessor. The microprocessor may be configured to exchange APDUmessages, with an information card, based on activation of the keys. Themicroprocessor may be configured to transmit, in response to activationof the trouble key, to a back-end system, a trouble flag that islogically linked to the customer through a transaction identifier.

The operating system may be configured to do one, some or all of thefollowing acts before transmitting the trouble flag: receive from a usera PIN; provide the PIN to the card; and receive from the cardverification of the PIN.

The operating system may be configured to provide the PIN to the card asan argument of an APDU command.

The apparatus may include an enclosure. The enclosure may enclose themicroprocessor. The enclosure may support the keypad. The enclosure maybear the trouble key. Trouble key may be disposed external to thekeypad.

The enclosure may include a top facet bearing the keypad. The enclosuremay include a top facet bearing the keypad. The enclosure may include avertical prism bearing the trouble key. The prism may include a shape inwhich facets or tangents to the facets are oriented parallel or nearparallel to an axis. The trouble key may be in electronic communicationwith the microprocessor.

The prism may include a first vertical lateral facet. The prism mayinclude a second vertical lateral facet opposite the first lateralfacet. The prism may include a card slot facet extending, adjacent anend of the keypad having the star and pound keys, between the first andsecond vertical lateral facets. The prism may include a distal verticalfacet extending, adjacent an end of the keypad having the 1, 2, and 3keys, between the first and second vertical lateral facets.

The first vertical lateral facet may bear the trouble key. The card slotfacet may bear the trouble key. The distal vertical facet may bear thetrouble key.

The apparatus may include, when the trouble key is a first trouble key,a second trouble key in electronic communication with themicroprocessor.

The operating system may be configured to transmit the trouble flag onlyafter activation of both the first and second trouble keys. Theoperating system may be configured to transmit the trouble flag onlyafter simultaneous activation of both the first and second trouble keys.

The operating system may be configured to transmit the trouble flag onlyafter a sequence of activations of both the first and second troublekeys.

The first vertical lateral facet may bear the first trouble key. Thesecond vertical lateral facet may bear the second trouble key. Thetrouble key may include a sensor.

Table 7 lists illustrative sensors.

TABLE 7 Illustrative sensors. Illustrative sensors Temperature sensorPressure sensor Capacitance sensor Displacement sensor Electricalresistance (conductance) sensor (e.g., for closing a circuit with a bodypart, e.g., hand, fingers) Other suitable sensors

The apparatus and methods may include methods for initiating a silentalarm in a card reader. The methods may include receiving at a cardacceptance device an ATR response from an information card. The methodsmay include using an off-card process selecting an on-card app. Theapplication may be a security app. The application may be a customeridentification app. The application may be a customer verificationmethods (“CVM”) app. The methods may include using the off-card process,displaying on the card acceptance device an instruction to activate asecurity circuit on an information card. The methods may includereceiving from the information card a trouble flag corresponding toactivation by a user of a security circuit on the card. The methods mayinclude receiving a user identification verification from theinformation card. The methods may include, after the receiving,communicating the trouble flag and a unique verification identifier to aback-end system.

The methods may include, using the off-card process, receiving a userauthorization to complete an on-card transaction. The methods mayinclude, using the off-card process, displaying a transaction completedmessage on a display.

The trouble flag may correspond to a duress condition. The trouble flagmay correspond to a panic condition.

The instruction may include both a duress element and a panic element.

The methods may include receiving at the back-end system the troubleflag and the tag. The methods may include using the tag to identify acustomer. The methods may include establishing a one-way viewport froman intervention process to subsequent transactions between a provider ofthe product and the customer.

The methods may include initiating a search for publicly availablerecords corresponding to the customer. The methods may include reportingto a case manager results from the search. The methods may includeproviding to a law enforcement agency electronic access to the viewport.

The methods may include, when the customer is a first customer having afirst risk profile, and the viewport is a first viewport, providing tothe law enforcement agency electronic access to a second viewport thatcorresponds to a second customer having a second risk profile that iscorrelated with the first risk profile.

The apparatus and methods may include methods for communicating atrouble condition from an information card to a card issuer.

The methods may include transmitting from an on-card microprocessor afirst program identifier and a second program identifier. The methodsmay include receiving at the microprocessor a card reader selection ofthe first program identifier. The methods may include receiving at themicroprocessor a card reader APDU request for a security circuit status.The methods may include receiving at the microprocessor a clock circuitcount range corresponding to an expected user interaction with theinformation card. The methods may include, using the microprocessor,detecting the user interaction during the range.

The methods may include, in response to the detecting, transmitting fromthe microprocessor a trouble flag. The detecting may include detectingat a microchip auxiliary contact a signal corresponding to theinteraction.

The methods may include, when the signal is a first signal, and theinteraction is a first interaction, detecting at the microchip auxiliarya second signal corresponding to a second user interaction with theinformation card.

The first signal may have a first time constant. The second signal mayhave a second time constant.

The first signal may be responsive to a first sensor on the informationcard. The second signal may be responsive to a second sensor on theinformation card.

The microprocessor may be configured to transmit the trouble flag onlyafter detection of both the first and second signals.

The methods may include transmitting from the information card to thereader a trouble sequence. The microprocessor may be configured totransmit the trouble flag only after detection of the first and secondtrouble keys in the sequence.

The microprocessor may be configured to transmit to the reader: thetrouble flag; and, after the trouble flag, ancon APDU TC message.

The first signal may be responsive to a temperature sensor on theinformation card. The first signal may be responsive to a capacitancesensor on the information card. The first signal may be responsive to adisplacement sensor on the information card. The first and secondsignals may correspond to closure of a circuit opening between the firstand the second sensors.

Illustrative embodiments of apparatus and methods in accordance with theprinciples of the invention will now be described with reference to theaccompanying drawings, which forma part hereof. It is to be understoodthat other embodiments maybe utilized and that structural, functionaland procedural modifications or omissions may be made without departingfrom the scope and spirit of the present invention.

FIG. 1 is a block diagram that illustrates a computing device 101(alternatively referred to herein as a “server or computer”) that may beused in accordance with the principles of the invention. The computerserver 101 may have a processor 103 for controlling overall operation ofthe server and its associated components, including RAM 105, ROM 107,input/output (“I/O”) module 109, and memory 115.

I/O module 109 may include a microphone, keypad, touchscreen and/orstylus through which a user of device 101 may provide input, and mayalso include one or more of a speaker for providing audio output and avideo display device for providing textual, audiovisual and/or graphicaloutput. Software may be stored within memory 115 and/or other storage(not shown) to provide instructions to processor 103 for enabling server101 to perform various functions. For example, memory 115 may storesoftware used by server 101, such as an operating system 117,application programs 119, and an associated database 111. Alternatively,some or all of computer executable instructions of server 101 may beembodied in hardware or firmware (not shown).

Server 101 may operate in a networked environment supporting connectionsto one or more remote computers, such as terminals 141 and 151.Terminals 141 and 151 may be personal computers or servers that includemany or all of the elements described above relative to server 101. Thenetwork connections depicted in FIG. 1 include a local area network(LAN) 125 and a wide area network (WAN) 129, but may also include othernetworks.

When used in a LAN networking environment, computer 101 is connected toLAN 125 through a network interface or adapter 113.

When used in a WAN networking environment, server 101 may include amodem 127 or other means for establishing communications over WAN 129,such as Internet 131.

It will be appreciated that the network connections shown areillustrative and other means of establishing a communications linkbetween the computers may be used. The existence of any of variouswell-known protocols such as TCP/IP, Ethernet, FTP, HTTP and the like ispresumed, and the system may be operated in a client-serverconfiguration to permit a user to retrieve web pages from a web-basedserver. Any of various conventional web browsers may be used to displayand manipulate data on web pages.

Additionally, application program 119, which may be used by server 101,may include computer executable instructions for invoking userfunctionality related to communication, such as email, short messageservice (SMS), and voice input and speech recognition applications.

Computing device 101 and/or terminals 141 or 151 may also be mobileterminals including various other components, such as a battery,speaker, and antennas (not shown). Terminal 151 and/or terminal 141 maybe portable devices such as a laptop, tablet, smartphone or any othersuitable device for receiving, storing, transmitting and/or displayingrelevant information.

Any information described above in connection with database 111, and anyother suitable information, may be stored in memory 115. One or more ofapplications 119 may include one or more algorithms that may be used toperform the functions of one or more of the customer authenticationengine, social security registration engine, social security numberdatabase server, trouble mitigation inquiry authentication engine,reporting engine, evaluation process, trouble mitigation process, and/orperform any other suitable tasks.

The invention may be operational with numerous other general purpose orspecial purpose computing system environments or configurations.Examples of well-known computing systems, environments, and/orconfigurations that may be suitable for use with the invention include,but are not limited to, personal computers, server computers, hand-heldor laptop devices, tablets, mobile phones and/or other personal digitalassistants (“PDAs”), multiprocessor systems, microprocessor-basedsystems, set top boxes, programmable consumer electronics, network PCs,minicomputers, mainframe computers, distributed computing environmentsthat include any of the above systems or devices, and the like.

The invention may be described in the general context ofcomputer-executable instructions, such as program modules, beingexecuted by a computer. Generally, program modules include routines,programs, objects, components, data structures, etc. that performparticular tasks or implement particular abstract data types. Theinvention may also be practiced in distributed computing environmentswhere tasks are performed by remote processing devices that are linkedthrough a communications network. In a distributed computingenvironment, program modules may be located in both local and remotecomputer storage media including memory storage devices.

FIG. 2 shows an illustrative apparatus 200 that may be configured inaccordance with the principles of the invention.

Apparatus 200 may be a computing machine. Apparatus 200 may include oneor more features of the apparatus that is shown in FIG. 1.

Apparatus 200 may include chip module 202, which may include one or moreintegrated circuits, and which may include logic configured to performany other suitable logical operations.

Apparatus 200 may include one or more of the following components: I/Ocircuitry 204, which may include a transmitter device and a receiverdevice and may interface with fiber optic cable, coaxial cable,telephone lines, wireless devices, PHY layer hardware, a keypad/displaycontrol device or any other suitable encoded media or devices;peripheral devices 206, which may include counter timers, real-timetimers, power-on reset generators or any other suitable peripheraldevices; logical processing device 208, which may compute imminence,permanence, edge weights, mapping, and perform other methods describedherein; and machine-readable memory 210.

Machine-readable memory 210 may be configured to store inmachine-readable data structures: tokens, patterns, codes, executorregistration information, super-executor registration information,co-executor registration information and any other suitable informationor data structures.

Components 202, 204, 206, 208 and 210 may be coupled together by asystem bus or other interconnections 212 and may be present on one ormore circuit boards such as 220. In some embodiments, the components maybe integrated into a single chip.

The chip may be silicon-based.

FIGS. 3-4 show illustrative architectures that may include one or moreof the features show in or described in connection with FIGS. 1 and 2.

FIG. 3 shows illustrative architecture 300 for controlling flow of aproduct between a customer and a vendor. Architecture 300 may includeenterprise core 302. The vendor may own enterprise core 302. The vendormay control enterprise core 302. Architecture 300 may include enterpriseoperational unit 304. The vendor may own enterprise operational unit304. The vendor may control enterprise operational unit 304.Architecture 300 may include enterprise operational unit 306. The vendormay own enterprise operational unit 306. The vendor may controlenterprise operational unit 306.

Architecture 300 may include social security number registrationplatform 308. Architecture 300 may include enterprise WAN 310. CustomerC may be in communication with WAN 310 via internet I. Customer C may bepresent with evaluation team members D at operational unit 304.Architecture 300 may include access to cellular communication network311.

Enterprise core 302 may include server 312 for exchanging productevaluation-related information. Evaluation-zone related services may beprovided by one or more applications served by application servers 314.Servers 314 may exchange applications and data with machine readablememory in data stores 316. Data stores 316 may be backed up by backupsystem 318.

Enterprise operational unit 304 may provide retail orbusiness-to-business services to registered customer C. Unit 304 mayinclude one or more evaluation team members D. Unit 304 may include oneor more evaluation team workstations 319. Evaluation team members D maycollect evaluation records from customer C, the vendor itself, orentities separate from the vendor. Evaluation team members D mayinteract with the evaluation process via workstations 319. Theevaluation team may use the apparatus and methods to perform theevaluation process on a request by customer C for a product. Theevaluation process may be supported by an application served byapplication server 322. Server 322 may exchange document informationwith data stores 324. HTML server 326 may provide the team with views ofthe evaluation process, status information about the evaluation process,permissions, and forms and data for reaching a decision about customerC's request. Elements in operational unit 304 may be interconnectedthrough LAN 327. Operational unit 304 may include card reader 329. Cardreader 329 may include a card acceptance device. Card reader 329 may beconfigured to exchange information with information card 331.Information card 331 may be designated for customer C.

Enterprise operational unit 306 may provide infrastructure for troublemitigation team members T to perform in conjunction with a troublemitigation process. Unit 306 may include one or more trouble mitigationteam workstations 328. Trouble mitigation team members T may receive atrouble flag from customer C via an application served by applicationserver 330. Server 330 may trouble mitigation information, such as theattributes, with data stores 332. HTML server 334 may provide troublemitigation team members T with the attributes, trouble flags, andsuitable forms, permissions, and data for performing the troublemitigation process. Elements in operational unit 306 may beinterconnected through LAN 336.

Any of the workstations may be mobile. The mobile devices may be inwireless communication with cellular network 311. Cellular network 311may be in wireless connection with one or both of WAN 310 and platform308.

Platform 308 may include customer authentication engine 340. Platform308 may include social security number registration engine 342. Platform308 may include social security number registration database server 344.Platform 308 may include trouble mitigation inquiry authenticationengine 346. Platform 308 may include reporting engine 348.

The members of the home and visiting teams may be distributedgeographically. Both home and visiting team members may be present atone or more of the operational units, such as 304 and 306.

Customer C may provide proof of identity to social security numberregistration platform 308 using customer authentication engine 340.Customer C may register customer C's social security number using socialsecurity number registration engine 342. Registration engine 342 mayprovide customer C with a profile, permissions to change the profile,and one or more conditions for disclosure of information in the profile.

Social security number database server 344 may store customer C'sprofile in connection with customer C's social security number.

A trouble mitigation team member T may respond to a trouble flag byauthenticating team member T to trouble mitigation inquiryauthentication engine 346. Reporting engine 348 may provide team memberT with confirmation of customer C's registration in a database incommunication with server 344. Reporting engine 348 may provide teammember T with a report that includes some or all of the elements of theprofile.

Mitigation team members T may provide access to the mitigation processto intervention party P.

FIG. 4 shows illustrative card reader 400. Card reader 400 may beillustrative of card reader 329 (shown in FIG. 3). Card reader 400 mayinclude prismatic facets 402, 404, 406 (not shown) and 408 (not shown).Prismatic facets 402, 404, 406 and 408 may support top facet 410. Topfacet 410 may support key pad 412. Key pad 412 may include numericalkeys 1-9, a star key, and a pound key. Information card slot 414 may beprovided through facet 402. Top facet 410 may bear trouble key 416. Cardreader 400 may include a processor (not shown). The processor mayoperate with an operating system that operates in conformance with oneor more of the standards. Card reader 400 may include a microcontrollerthat has a hardware terminal. Trouble key 416 may be in electroniccommunication with the microcontroller.

FIG. 5 shows illustrative card reader 500. Card reader 500 may beillustrative of card reader 329 (shown in FIG. 3). Card reader 500 mayinclude prismatic facets 502, 504, 506 (not shown) and 508 (not shown).Prismatic facets 502, 504, 506 and 508 may support top facet 510. Topfacet 510 may support key pad 512. Key pad 512 may include numericalkeys 1-9, a star key, and a pound key. Information card slot 514 may beprovided through facet 502. Facet 504 may bear trouble key 516. Cardreader 500 may include a processor (not shown). The processor mayoperate with an operating system that operates in conformance with oneor more of the standards. Card reader 500 may include a microcontrollerthat has a hardware terminal. Trouble key 516 may be in electroniccommunication with the microcontroller.

FIG. 6 shows illustrative card reader 600. Card reader 600 may beillustrative of card reader 329 (shown in FIG. 3). Card reader 600 mayinclude prismatic facets 602, 604, 606 (not shown) and 608 (not shown).Prismatic facets 602, 604, 606 and 608 may support top facet 610. Topfacet 610 may support key pad 612. Key pad 612 may include numericalkeys 1-9, a star key, and a pound key. Information card slot 614 may beprovided through facet 602. Facet 604 may bear trouble key 616. Facet608 may bear trouble key 618 (shown through card reader 600). Cardreader 600 may include a processor (not shown). The processor mayoperate with an operating system that operates in conformance with oneor more of the standards. Card reader 600 may include a microcontrollerthat has a hardware terminal. Trouble key 616 may be in electroniccommunication with the microcontroller. Trouble key 618 may be inelectronic communication with the microcontroller.

FIG. 7 shows illustrative information card 700. Information card 700 maybe illustrative of information card 331 (shown in FIG. 3). Informationcard 700 may include one or more laminae 702. Information card 700 mayinclude chip 704. Chip 704 may include one or more contact terminals706. Chip 704 may communicate with the card reader through one or moreof terminals 706. Information card 700 may include an antenna (notshown). Chip 704 may communicate with the card reader, via contactlesscard protocols, via the antenna.

Dip length D may be a length of card 700 that is disposed inside a cardreader such as 329 (shown in FIG. 3) when card 700 is dipped into thecard reader and in position for communication with the card reader.Exposed length E may be a length of card 700 that remains exposedoutside the card reader when card 700 is dipped into the card reader andin position for communication with the card reader.

Information card 700 may include TROUBLE key 708. TROUBLE key 708 may bedisposed in a region of card 700 that corresponds to length E.Information card may include conductor 710. Conductor 710 may be inelectronic communication with TROUBLE key 708. TROUBLE key 708 mayinclude one or more of the sensors. Conductor 710 may be in electroniccommunication with terminal 712. Conductor 710 may be disposed betweentwo or more laminae 702. TROUBLE key 708 may be laminated to top surface714 (embossed with name of customer C) of card 700. TROUBLE key 708 maybe embedded in one or more of laminae 702. TROUBLE key 708 may bepartially embedded in one or more of laminae 702.

FIG. 8 shows illustrative information card 800. Information card 800 maybe illustrative of information card 331 (shown in FIG. 3). Informationcard 800 may include one or more laminae 802. Information card 800 mayinclude chip 804. Chip 804 may include one or more contact terminals806. Chip 804 may communicate with the card reader through one or moreof terminals 806. Information card 800 may include an antenna (notshown). Chip 804 may communicate with the card reader, via contactlesscard protocols, via the antenna.

Information card 800 may include TROUBLE key 808. TROUBLE key 808 may bedisposed in a region of card 800 that corresponds to length E.Information card may include conductor 810. Conductor 810 may be inelectronic communication with TROUBLE key 808. TROUBLE key 808 mayinclude one or more of the sensors. Conductor 810 may be in electroniccommunication with terminal 812. Conductor 810 may be disposed betweentwo or more laminae 802. TROUBLE key 808 may be laminated to bottomsurface 814 (reverse of the side having embossed customer name) of card800. TROUBLE key 808 may be embedded in one or more of laminae 802.TROUBLE key 808 may be partially embedded in one or more of laminae 802.

FIG. 9 shows illustrative information card 900. Information card 900 maybe illustrative of information card 331 (shown in FIG. 3). Informationcard 900 may include one or more laminae 902. Information card 900 mayinclude chip 904. Chip 904 may include one or more contact terminals906. Chip 904 may communicate with the card reader through one or moreof terminals 906. Information card 900 may include an antenna (notshown). Chip 904 may communicate with the card reader, via contactlesscard protocols, via the antenna.

Information card 900 may include TROUBLE key 908. TROUBLE key 908 may bedisposed in a region of card 900 that corresponds to length E.Information card may include conductor 910. Conductor 910 may be inelectronic communication with TROUBLE key 908. TROUBLE key 908 mayinclude one or more of the sensors. Conductor 910 may be in electroniccommunication with terminal 912. Conductor 910 may be disposed betweentwo or more laminae 902. TROUBLE key 908 may be laminated to card side914 of card 900. TROUBLE key 908 may be laminated to a card sideopposite card side 914 of card 900. TROUBLE key 908 may be embedded inone or more of laminae 902. TROUBLE key 908 may be partially embedded inone or more of laminae 902.

FIG. 10 shows illustrative information card 1000. Information card 1000may be illustrative of information card 331 (shown in FIG. 3).Information card 1000 may include one or more laminae (not shown).Information card 1000 may include chip 1004. Chip 1004 may include oneor more contact terminals 1006. Chip 1004 may communicate with the cardreader through one or more of terminals 1006. Information card 1000 mayinclude an antenna (not shown). Chip 1004 may communicate with the cardreader, via contactless card protocols, via the antenna.

Information card 1000 may include TROUBLE key 1008. TROUBLE key 1008 maybe disposed in a region of card 1000 that corresponds to length E.Information card may include conductor 1010. Conductor 1010 may be inelectronic communication with TROUBLE key 1008. TROUBLE key 1008 mayinclude one or more of the sensors. Conductor 1010 may be in electroniccommunication with terminal 1012. Conductor 1010 may be disposed betweentwo or more of the laminae. TROUBLE key 1008 may be laminated to cardside 1014 of card 1000. TROUBLE key 1008 may be laminated to a card sideopposite card side 1014 of card 1000. TROUBLE key 1008 may be embeddedin one or more of the laminae. TROUBLE key 1008 may be partiallyembedded in one or more of laminae 1002.

Information card 1000 may include TROUBLE key 1009. TROUBLE key 1009 maybe disposed in a region of card 1000 that corresponds to length E.Information card may include conductor 1011. Conductor 1011 may be inelectronic communication with TROUBLE key 1009. TROUBLE key 1009 mayinclude one or more of the sensors. Conductor 1011 may be in electroniccommunication with terminal 1012. Conductor 1011 may be disposed betweentwo or more of the laminae. TROUBLE key 1009 may be laminated to cardside 1014 of card 1000. TROUBLE key 1009 may be laminated to a card sideopposite card side 1014 of card 1000. TROUBLE key 1009 may be embeddedin one or more of the laminae. TROUBLE key 1009 may be partiallyembedded in one or more of laminae 1002.

Information card 1000 may include both TROUBLE keys 1008 and 1009.

Apparatus may omit features shown and/or described in connection withillustrative apparatus. Embodiments may include features that areneither shown nor described in connection with the illustrativeapparatus. Features of illustrative apparatus may be combined. Forexample, an illustrative embodiment may include features shown inconnection with another illustrative embodiment.

For the sake of illustration, the steps of the illustrated processeswill be described as being performed by a “system.” A “system” mayinclude one or more of the features of the apparatus that are shown inFIGS. 1-10 and/or any other suitable device or approach. The “system”may include one or more means for performing one or more of the stepsdescribed herein.

The steps of methods may be performed in an order other than the ordershown and/or described herein. Embodiments may omit steps shown and/ordescribed in connection with illustrative methods. Embodiments mayinclude steps that are neither shown nor described in connection withillustrative methods.

Illustrative method steps may be combined. For example, an illustrativemethod may include steps shown in connection with another illustrativemethod.

FIG. 11 shows illustrative steps of process 1100 in accordance with theprinciples of the invention. Process 1100 may begin at step 1102. Atstep 1102, a system may electronically grant a first permission. Thefirst permission may be for interacting with a customer such as customerC (shown in FIG. 3). The permission may be an electronic permission. Thepermission may be a business rule that permits direct communication withcustomer C. The electronic permission may involve the use of a login, apassword, or any suitable authentication process to prevent unauthorizedinteraction with customer C. The interaction may include viewing, addingto, or editing records of the evaluation process. The first permissionmay be granted to first institutional representatives.

At step 1104, the system may electronically grant a second permission.The second permission may be for interacting with customer C (shown inFIG. 3). The permission may be an electronic permission. The permissionmay be a business rule that prohibits direct communication of any kindwith customer C. The electronic permission may involve the use of alogin, a password, or any suitable authentication process to preventunauthorized interaction with customer C. The interaction may includeviewing, adding to, or editing records of the trouble mitigationprocess. The second permission may be granted to second institutionalrepresentatives.

At step 1106, the system may receive from a party a request for aproduct. The request may name customer C. The request may identifycustomer C with a social security number. The party may be an associateof customer C. The party may be a relative of customer C. The party mayhave obtained from customer C access to personal information aboutcustomer C.

At step 1108, the system may initialize an electronic evaluation-processcorresponding to the request. Records in the electronic evaluationprocess may be viewable under the first permission. Records in theelectronic evaluation process may be viewable under the secondpermission.

At step 1110, the system may determine that the social security numberhas been electronically flagged by the customer. The electronic flaggingmay be registered in the social security number registration platform(shown in FIG. 3).

At step 1112, the system may initialize an electronic trouble-mitigationprocess corresponding to the request. Records in the electronictrouble-mitigation process may be records that are not viewable underthe first permission; and viewable under the second permission.

FIG. 12 shows illustrative steps of process 1200 in accordance with theprinciples of the invention. Process 1200 may begin at step 1202. Atstep 1202, a system may receive an ATR response from an information cardsuch as card 331 (shown in FIG. 3). At step 1204, the system may, usingan off-card process, display on a card acceptance device, such as cardreader 329 (shown in FIG. 3), an instruction to enter a user trouble-keysequence. The user may be customer C. The off-card process may run, inwhole or in part, on one or more of a server (such as 314 or 322 (shownin FIG. 3), a work station (such as 319 (shown in FIG. 3)), a cardreader (such as 329 (shown in FIG. 3)) or any other suitable device.

At step 1206, the system may receive the trouble code.

At step 1208, the system may, in response to receiving the trouble code,communicate to a back-end system a trouble code flag. The back-endsystem may include one or more of a server (such as 314 or 332 (shown inFIG. 3) and a work station (such as 328 (shown in FIG. 3)) or any othersuitable device. The back-end system may include a computing environmentthat supports the trouble mitigation process.

At step 1210, the system may transmit to the information card anapplication selection. The application selection may be a selectiondefined in one of the standards. The application selection may be partof the evaluation process for the transaction of the product even when atrouble code has not been communicated. The application selection may bea step that is not part of the trouble mitigation process.

FIG. 13 shows illustrative steps of process 1300 in accordance with theprinciples of the invention. Process 1300 may begin at step 1302. Atstep 1302, a system may receive at a card acceptance device (such as 329(shown in FIG. 3)) an ATR response from an information card (such as 331(shown in FIG. 3)). At step 1304, the system may, using an off-cardprocess, select an on-card security application. The off-card processmay run, in whole or in part, on one or more of a server (such as 314 or322 (shown in FIG. 3), a work station (such as 319 (shown in FIG. 3)), acard reader (such as 329 (shown in FIG. 3)) or any other suitabledevice. The security application may be a customer authentication orverification application that conforms to one or more of the standards.The security application may be an online application. The securityapplication may be an off-line application. The off-card process mayselect an on-card application that includes a security procedure. In thesecurity procedure, the card may issue an ARQC (“go online”) APDU to thereader. In the online process, an issuer of the card may transmit to thereader an issuer authentication (an “ARPC” APDU message) of thecustomer.

At step 1306, the system may, using the off-card process, display on thecard accepting device an instruction to the customer to activate asecurity circuit on an information card. The instruction may instructthe customer, e.g., “PUSH TROUBLE BUTTON TO ALERT ISSUER THAT YOU AREUNDER COERCION.”

At step 1308, the system may receive from the information card a troubleflag corresponding to activation by a user of the security circuit onthe card.

At step 1310, the system may receive user identification verificationfrom the information card. The user may be the customer.

At step 1312, the system may, after receiving the trouble flag,communicate the trouble flag and a unique verification identifier to aback-end system. The trouble flag and the unique verification identifiermay be communicated in a context in which the trouble flag is logicallylinked to the electronic dialogue between the card reader and the card.The unique verification identifier may uniquely identify the dialogue.The back-end system may link the unique verification identifier to thecard. The link may be based on the verification obtained using thesecurity application.

FIG. 14 shows illustrative steps of process 1400 in accordance with theprinciples of the invention. Process 1400 may begin at step 1402. Atstep 1402, a system may transmit from an on-card microprocessor a firstprogram identifier and a second program identifier. At step 1404, thesystem may receive, at the microprocessor, from a card reader, aselection of the first program identifier; an APDU request for asecurity circuit status; and a clock circuit count range correspondingto an expected user interaction with the information card. At step 1406,the system may, using the microprocessor, detect the user interactionduring the range.

As will be appreciated by one of skill in the art, the inventiondescribed herein may be embodied in whole or in part as a method, a dataprocessing system, or a computer program product. Accordingly, theinvention may take the form of an entirely hardware embodiment, anentirely software embodiment or an embodiment combining software,hardware and any other suitable approach or apparatus.

Thus, methods and apparatus for controlling flow of products andservices between a customer and a vendor have been provided. Personsskilled in the art will appreciate that the present invention may bepracticed by other than the described embodiments, which are presentedfor purposes of illustration rather than of limitation. The presentinvention is limited only by the claims that follow.

What is claimed is:
 1. A method for preventing economic abuse, themethod comprising: taking in, at a vendor's information services system,a request from an economic predator for a product or service wherein thepredator is impersonating or coercing a victim who is a legitimatecustomer or prospective customer, the request being optionally a requestfor credit, a credit card, a loan, a mortgage or a cash advance;obtaining from the victim the victim's identity in the form of a socialsecurity number optionally at a card-reading machine, a brick-and-mortarfacility or a vendor's online business platform; tagging the victimoptionally using one or more of: social media, an anonymous report by athird party; and optionally checking a public, government or privatedatabase for evidence of domestic or economic predation orvictimization.
 2. The method of claim 1 further comprising, when thevictim is a customer: electronically granting a first permission, forinteracting with the customer, to first vendor representatives;electronically granting a second permission, excluding interacting withthe customer, to second institutional representatives; receiving fromthe predator the request for a product, the request naming a customerand identifying the customer with a social security number; initializingan electronic evaluation-process corresponding to the request;determining that the social security number is electronically flagged bythe customer; initializing an electronic trouble-mitigation processcorresponding to the request; wherein: records in the electronicevaluation process are viewable under: the first permission; and thesecond permission; and records in the electronic trouble-mitigationprocess are: not viewable under the first permission; and viewable underthe second permission.
 3. The method of claim 2 wherein the determiningincludes identifying the social security number in a registry.
 4. Themethod of claim 3 further comprising: accessing the registry as aninstitutional user; and not accessing the registry as an administratorof the registry.
 5. The method of claim 2 further comprising: assigningto the evaluation process an evaluation timeline; adding a series ofevaluation records to the evaluation process in conformance with thetimeline; and, during the adding, echoing an evaluation record from theevaluation process to the trouble-mitigation process.
 6. The method ofclaim 2 further comprising transmitting to a customer mobilecommunication device an alert indicating initiation of thetrouble-mitigation process.
 7. The method of claim 2 further comprising:from the trouble-mitigation process, adding to the evaluation process arecord requiring biometric authentication of the customer, a source of arecord corresponding to the requirement being unidentifiable in theevaluation process by the first representatives.
 8. The method of claim2 further comprising: from the trouble-mitigation process, adding to theevaluation process a record requiring in-person attendance of thecustomer at a meeting with first representatives, a source of a recordcorresponding to the requirement being unidentifiable in the evaluationprocess by the first representatives.
 9. The method of claim 2 furthercomprising: from the trouble-mitigation process, adding to theevaluation process a record requiring an electronic on-cardcommunication from the customer, a source of a record corresponding tothe requirement being unidentifiable in the evaluation process by thefirst representatives.
 10. The method of claim 2 further comprisingproviding to the customer a link to the social security number registry.11. The method of claim 2 wherein the determining comprisesauthenticating an institution to the registry.
 12. The method of claim 2further comprising echoing a record from the evaluation process to thetrouble-mitigation process.
 13. The method of claim 2 further comprisingtransmitting a suspicious activity report to an intervention party. 14.The method of claim 13 further comprising electronically granting thesecond permission to the intervention party.
 15. The method of claim 13further comprising receiving a stop-process instruction from theintervention party.
 16. The method of claim 13 further comprising: fromthe trouble-mitigation process, adding to the evaluation process arecord including a stop-process instruction, a source of the recordcorresponding to the requirement being unidentifiable in the evaluationprocess by the first representatives.
 17. The method of claim 2 furthercomprising denying the request.
 18. The method of claim 2 furthercomprising: electronically searching public documents naming thecustomer; culling the documents based on indicia of economicexploitation; entering into the trouble-mitigation process a recordcorresponding to a culled document.
 19. The method of claim 2 furthercomprising, when the request is a current request that is received by aproduct vendor: identifying in an archive owned by the vendor a recordof a prior request naming the customer; and entering into thetrouble-mitigation process a record indicating historical activity. 20.The method of claim 19 further comprising, in response to the historicalactivity, transmitting an electronic alert to an administratorauthorized to obtain both the first and the second permission.
 21. Themethod of claim 2 further comprising, when the request is a currentrequest that is received by a product vendor: identifying in an archiveowned by the vendor a record of a prior request naming an individualthat is not the customer; and entering into the trouble-mitigationprocess a record indicating historical activity.