System and method for bootstrapping a user binding
First Claim
1. A method comprising:
- confirming an identity of a user by a first relying party using a first identity verification technique responsive to the user acquiring a first device having an authenticator;
wherein the first relying party provides the user with a subscriber identity module (SIM) inserted in the first device to communicate with the authenticator;
generating or collecting initial user verification reference data upon verifying the identity of the user through the first identity verification technique;
wherein generating initial user verification reference data comprises capturing first biometric data to be compared against second biometric data captured by the authenticator during the second identity verification technique;
securely providing, by the first relying party, the initial user verification reference data or data derived from the initial user verification reference data to the authenticator;
the authenticator implementing a second identity verification technique by comparing the initial user verification reference data or data derived from the initial user verification reference data to data collected from the user or data collected from the first device provided to the user;
and providing proof of a successful verification of the identity of the user to a second relying party prior to or during a registration request of the authenticator with the second relying party.
3 Assignments
0 Petitions
Accused Products
Abstract
A system, apparatus, method, and machine readable medium are described for bootstrapping an authenticator. For example, one embodiment of a method comprising: confirming an identity of a user by a first relying party using a first identity verification technique responsive to the user acquiring a device having an authenticator; generating or collecting initial user verification reference data upon verifying the identity of the user through the first identity verification technique; securely providing the initial user verification reference data or data derived from the initial user verification reference data to the authenticator; the authenticator implementing a second identity verification technique by comparing the initial user verification reference data or data derived from the initial user verification reference data to data collected from the user or data collected from a device provided to the user; and providing proof of a successful verification of the identity of the user to a second relying party during a registration request of the authenticator with the second relying party.
-
Citations
23 Claims
-
1. A method comprising:
-
confirming an identity of a user by a first relying party using a first identity verification technique responsive to the user acquiring a first device having an authenticator; wherein the first relying party provides the user with a subscriber identity module (SIM) inserted in the first device to communicate with the authenticator; generating or collecting initial user verification reference data upon verifying the identity of the user through the first identity verification technique; wherein generating initial user verification reference data comprises capturing first biometric data to be compared against second biometric data captured by the authenticator during the second identity verification technique; securely providing, by the first relying party, the initial user verification reference data or data derived from the initial user verification reference data to the authenticator; the authenticator implementing a second identity verification technique by comparing the initial user verification reference data or data derived from the initial user verification reference data to data collected from the user or data collected from the first device provided to the user; and providing proof of a successful verification of the identity of the user to a second relying party prior to or during a registration request of the authenticator with the second relying party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory machine-readable medium having program code stored thereon which, when executed by one or more machines, causes the machines to perform the operations of:
-
confirming an identity of a user by a first relying party using a first identity verification technique responsive to the user acquiring a first device having an authenticator; wherein the first relying party provides the user with a subscriber identity module (SIM) inserted in the first device to communicate with the authenticator; generating or collecting initial user verification reference data upon verifying the identity of the user through the first identity verification technique; wherein generating initial user verification reference data comprises capturing first biometric data to be compared against second biometric data captured by the authenticator during the second identity verification technique; securely providing, by the first relying party, the initial user verification reference data or data derived from the initial user verification reference data to the authenticator; the authenticator implementing a second identity verification technique by comparing the initial user verification reference data or data derived from the initial user verification reference data to data collected from the user or data collected from the first device provided to the user; and providing proof of a successful verification of the identity of the user to a second relying party prior to or during a registration request of the authenticator with the second relying party. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification