Identity validation using local environment information
First Claim
Patent Images
1. A computer-implemented method comprising:
- initiating, by a processor, a first verification event;
identifying two or more devices that are within a predetermined area of the processor during the initiating of the first verification event;
identifying that one device of the two or more devices is not properly communicating with the processor, wherein the processor identifies that the one device is not properly communicating by the processor not being able to determine that the one device belongs to the verified user, the processor not being able to determine that the one device belongs to the verified user due to noise during the first verification event, wherein noise is a communication interference generated by one or more devices not belonging to the verified user;
alerting the verified user to activate a communication channel on the one device, the activation of the communication channel indicating to the processor that the one device belongs to the verified user and is not noise;
alerting the verified user to add the one device to a library;
verifying an identity of a verified user based on the two or more devices, wherein verifying the identity of the verified user based on the two or more devices includes;
accessing the library, wherein the library includes a list of the two or more devices as being authorized by the verified user to allow the processing of one or more verification events, wherein the two or more devices are authorized by the verified user registering the two or more devices into the library before the initiation of the first verification event, anddetermining that a combination of the two or more devices confirms the identity of the verified user; and
processing the first verification event in response to verifying the identity of the verified user.
1 Assignment
0 Petitions
Accused Products
Abstract
A processor may initiate a first verification event. The processor may identify two or more devices that are within a predetermined area of the processor during the initiating of the first verification event. The processor may verify an identity of a verified user based on the two or more devices. The processor may process the first verification event in response to verifying the identity of the verified user.
-
Citations
16 Claims
-
1. A computer-implemented method comprising:
-
initiating, by a processor, a first verification event; identifying two or more devices that are within a predetermined area of the processor during the initiating of the first verification event; identifying that one device of the two or more devices is not properly communicating with the processor, wherein the processor identifies that the one device is not properly communicating by the processor not being able to determine that the one device belongs to the verified user, the processor not being able to determine that the one device belongs to the verified user due to noise during the first verification event, wherein noise is a communication interference generated by one or more devices not belonging to the verified user; alerting the verified user to activate a communication channel on the one device, the activation of the communication channel indicating to the processor that the one device belongs to the verified user and is not noise; alerting the verified user to add the one device to a library; verifying an identity of a verified user based on the two or more devices, wherein verifying the identity of the verified user based on the two or more devices includes; accessing the library, wherein the library includes a list of the two or more devices as being authorized by the verified user to allow the processing of one or more verification events, wherein the two or more devices are authorized by the verified user registering the two or more devices into the library before the initiation of the first verification event, and determining that a combination of the two or more devices confirms the identity of the verified user; and processing the first verification event in response to verifying the identity of the verified user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a memory; and a processor in communication with the memory, the processor being configured to perform operations comprising; initiating, by a processor, a first verification event; identifying two or more devices that are within a predetermined area of the processor during the initiating of the first verification event; identifying that one device of the two or more devices is not properly communicating with the processor, wherein the processor identifies that the one device is not properly communicating by the processor not being able to determine that the one device belongs to the verified user, the processor not being able to determine that the one device belongs to the verified user due to noise during the first verification event, wherein noise is a communication interference generated by one or more devices not belonging to the verified user; alerting the verified user to activate a communication channel on the one device, the activation of the communication channel indicating to the processor that the one device belongs to the verified user and is not noise; alerting the verified user to add the one device to a library; verifying an identity of a verified user based on the two or more devices, wherein verifying the identity of the verified user based on the two or more devices includes; accessing the library, wherein the library includes a list of the two or more devices as being authorized by the verified user to allow the processing of one or more verification events, wherein the two or more devices are authorized by the verified user registering the two or more devices into the library before the initiation of the first verification event, and determining that a combination of the two or more devices confirms the identity of the verified user; and processing the first verification event in response to verifying the identity of the verified user. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to perform a method, the method comprising:
-
initiating, by a processor, a first verification event; identifying two or more devices that are within a predetermined area of the processor during the initiating of the first verification event; identifying that one device of the two or more devices is not properly communicating with the processor, wherein the processor identifies that the one device is not properly communicating by the processor not being able to determine that the one device belongs to the verified user, the processor not being able to determine that the one device belongs to the verified user due to noise during the first verification event, wherein noise is a communication interference generated by one or more devices not belonging to the verified user; alerting the verified user to activate a communication channel on the one device, the activation of the communication channel indicating to the processor that the one device belongs to the verified user and is not noise; alerting the verified user to add the one device to a library; verifying an identity of a verified user based on the two or more devices, wherein verifying the identity of the verified user based on the two or more devices includes; accessing the library, wherein the library includes a list of the two or more devices as being authorized by the verified user to allow the processing of one or more verification events, wherein the two or more devices are authorized by the verified user registering the two or more devices into the library before the initiation of the first verification event, and determining that a combination of the two or more devices confirms the identity of the verified user; and processing the first verification event in response to verifying the identity of the verified user. - View Dependent Claims (14, 15, 16)
-
Specification