Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


02:39 PM
Dark Reading
Dark Reading
Products and Releases

CDYNE Corp. Introduces Social Security Number Verification Web Service

Death Index 3.0 verifies identity and prevents identity fraud in real time

CHESAPEAKE, Va., Dec. 16, 2010 /PRNewswire/ -- CDYNE Corporation, a leading provider of Data Quality and Communication Web Services announced today the release of Death Index 3.0 to verify identity and prevent identity fraud in real time. Death Index 3.0 is available at cdyne.com as part of its suite of Data Quality Web Services. Death Index 3.0 was also introduced as one of the first 35 partnership offerings to distribute data sets on the Windows Azure Marketplace.

(Logo: http://photos.prnewswire.com/prnh/20090701/PH40278LOGO )

CDYNE Death Index 3.0 is a hosted, programmable Web Service that validates Social Security Numbers against the Social Security Administration's Death Master File. With access to over 86 million records of deaths that have been reported to the Social Security Administration, Death Index 3.0 will return the Social Security Number, name, date of birth, date of death, state or country of residence, zip code of last residence, and zip code of lump sum payment.

The Death Index 3.0 Web Service provides key business benefits of integrating Social Security Number verification with existing business applications, without the need to maintain and update a large database. Monthly updates are provided automatically and come directly from the United States Social Security Administration.

Web Services are a key point of integration for business applications that exist on different platforms, languages, and systems. IT departments can interface with Death Index 3.0 Web Service using SOAP (Simple Object Access Protocol) or RESTful (Representational State Transfer) endpoints, using JSON (JavaScript Object Notation) or XML formats to build Social Security Number validation features into existing business applications.

"This new release meets the latest standards and requirements in the industry," said Valentin Ivanov, Chief Software Architect of CDYNE Corporation. "We are very excited to be a partner with Microsoft and offer Death Index 3.0 on Windows Azure Marketplace."

CDYNE's partnership with the Windows Azure Marketplace makes it easy for developers to consume CDYNE Death Index 3.0. Windows Azure Marketplace is a data marketplace that matches information providers with end users and developers, and it is a feature of the Windows Azure cloud platform where data sets can be listed, searched for, and consumed.

The Death Index Web Service is backed up with a 100% Service Level Agreement (SLA), protecting clients from unscheduled outages. CDYNE's data centers are strategically located in different areas across the United States, providing redundancy and location fail-over enabling.

About CDYNE Corporation

Since 1999, CDYNE has provided enterprise Data Quality and Communications Web Services to solve the business need for real-time communication and data quality verification. Web Services include Phone Notify!, SMS Notify!, Postal Address Verification, Phone Verification, Demographics, Death Index, and IP2Geo. CDYNE billing is transaction-based and post-pay. Clients pay for only what is consumed, eliminating overage charges and unused credits. There are no contracts, startup fees, or cancellation charges. For more information, visit cdyne.com or call 1-800-984-3710.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-28
IBM MQ 7.5, 8.0, 9.0, 9.1, 9.2 LTS, and 9.2 CD could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe deserialization of trusted data. An attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 186509.
PUBLISHED: 2021-01-28
IBM QRadar SIEM 7.4.0 to 7.4.2 Patch 1 and 7.3.0 to 7.3.3 Patch 7 could allow a remote attacker to execute arbitrary commands on the system, caused by insecure deserialization of user-supplied content by the Java deserialization function. By sending a malicious serialized Java object, an attacker co...
PUBLISHED: 2021-01-28
A cross-site request forgery vulnerability exists in the GACL functionality of OpenEMR 5.0.2 and development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce). A specially crafted HTTP request can lead to the execution of arbitrary requests in the context of the victim. An attacker can...
PUBLISHED: 2021-01-28
Cross-site scripting vulnerability in Aterm WF800HP firmware Ver1.0.9 and earlier allows remote attackers to inject an arbitrary script via unspecified vectors.
PUBLISHED: 2021-01-28
Cross-site request forgery (CSRF) vulnerability in Aterm WG2600HP firmware Ver1.0.2 and earlier, and Aterm WG2600HP2 firmware Ver1.0.2 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors.