Identity verification and authentication
First Claim
1. A method comprising:
- receiving, by a first computing device associated with a social-networking system from a second computing device associated with a first party of a financial transaction, a request to verify a claimed identity of a second party to the financial transaction, the social-networking system maintaining information relating to one or more social connections of the first party of the financial transaction with additional users of the social-networking system;
identifying, by the first computing device associated with the social-networking system, social connection information relating to the one or more social connections of the second party with the additional users of the social-networking system;
sending, by the first computing device to a third computing device associated with the second party, a second request for information about the second party;
receiving, at the first computing device from the third computing device, the information about the second party;
determining, by the first computing device, a confidence score indicating a confidence level of the claimed identity of the second party, based at least in part on the information received from the third computing device and information available to the social-networking system; and
sending, by the first computing device to the second computing device associated with the first party, the confidence score for verifying the claimed identity of the second party.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, receiving, at a first computing device associated with a social-networking system and from a second computing device, a first request to verify an identity of a user of the social-networking system; sending, by the first computing device and to a mobile device associated with the user, a second request for information about the user; receiving, at the first computing device and from the mobile device, the information about the user; determining, by the first computing device, a confidence score indicating a probability that the identity of the user is true based on the information about the user received from the mobile device and information available to the social-networking system; and sending, by the first computing device and to the second computing device, the confidence score.
8 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a first computing device associated with a social-networking system from a second computing device associated with a first party of a financial transaction, a request to verify a claimed identity of a second party to the financial transaction, the social-networking system maintaining information relating to one or more social connections of the first party of the financial transaction with additional users of the social-networking system; identifying, by the first computing device associated with the social-networking system, social connection information relating to the one or more social connections of the second party with the additional users of the social-networking system; sending, by the first computing device to a third computing device associated with the second party, a second request for information about the second party; receiving, at the first computing device from the third computing device, the information about the second party; determining, by the first computing device, a confidence score indicating a confidence level of the claimed identity of the second party, based at least in part on the information received from the third computing device and information available to the social-networking system; and sending, by the first computing device to the second computing device associated with the first party, the confidence score for verifying the claimed identity of the second party. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A first computing device associated with a social-networking system comprising:
-
a memory comprising instructions executable by one or more processors; and the one or more processors coupled to the memory and operable to execute the instructions, the one or more processors being operable when executing the instructions to; receive, from a second computing device associated with a first party to a financial transaction, a request to verify a claimed identity of a second party to the financial transaction, the social-networking system maintaining information relating to one or more social connections of the first party of the financial transaction with additional users of the social-networking system; identify social connection information relating to the one or more social connections of the second party with the additional users of the social-networking system; send, to a third computing device associated with the second party, a second request for information about the second party; receive, from the third computing device, the information about the second party; determine a confidence score indicating a confidence level of the claimed identity of the second party based at least in part on the information received from the third computing device and information available to the social-networking system; and send, to the second computing device associated with the first party, the confidence score for verifying the claimed identity of the second party. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. One or more computer-readable non-transitory storage media embodying software operable when executed by a first computing device associated with a social networking system to:
-
receive, from a second computing device associated with a first party to a financial transaction, a request to verify a claimed identity of a second party to the financial transaction, the social-networking system maintaining information relating to one or more social connections of the first party of the financial transaction with additional users of the social-networking system; identify social connection information relating to the one or more social connections of the second party with the additional users of the social-networking system; send, to a third computing device associated with the second party, a second request for information about the second party; receive, from the third computing device, the information about the second party; determine a confidence score indicating a confidence level of the claimed identity of the second party based at least in part on the information received from the third computing device and information available to the social-networking system; and send, to the second computing device associated with the first party, the confidence score for verifying the claimed identity of the second party. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification