Method and system to validate identity without putting privacy at risk
First Claim
1. A method for verifying a user, the method comprising:
- the user transferring a first user identifier from a first source to a device;
the user transferring a second user identifier from a second source to the device, the first source different from the second source and the first user identifier different from the second user identifier;
the first source comprising a first media and the second source comprising a second media;
the first and second user identifiers not stored in the device prior to the steps of transferring;
comparing the first and second user identifiers or corresponding portions of the first and second user identifiers at the device without sending the first and second user identifiers nor the corresponding portions of the first and second user identifiers external to the device;
at the device determining a correlation score responsive to the comparing step;
at the device determining a relationship between the correlation score and a predetermined correlation threshold;
at the device, verifying that the first and second user identifiers identify a same person if the correlation score is greater than or equal to the predetermined correlation threshold, and if a step of transferring the second user identifier was executed within a predetermined time interval from the step of transferring the first user identifier; and
issuing an indication according to a verifying step.
10 Assignments
0 Petitions
Accused Products
Abstract
A method and system to verify identity while protecting private data. To locally verify identity without requiring communication with an external database or passing personal/identity information over network connections. To create a database and/or statistical model for later use to verify identify, private information from a first media is input to a device. Private information subsequently presented via a second media is then verified locally by comparing to the private information previously captured from the first media. If the resultant correlation score is sufficiently high the private information from the first media and from the second media are determined to belong to the same individual, and the user is authenticated or a desired action is approved. In case of a low correlation score, a notification may be sent to one or more entities alerting authorities of a security breach or identity theft.
-
Citations
17 Claims
-
1. A method for verifying a user, the method comprising:
-
the user transferring a first user identifier from a first source to a device; the user transferring a second user identifier from a second source to the device, the first source different from the second source and the first user identifier different from the second user identifier; the first source comprising a first media and the second source comprising a second media; the first and second user identifiers not stored in the device prior to the steps of transferring; comparing the first and second user identifiers or corresponding portions of the first and second user identifiers at the device without sending the first and second user identifiers nor the corresponding portions of the first and second user identifiers external to the device; at the device determining a correlation score responsive to the comparing step; at the device determining a relationship between the correlation score and a predetermined correlation threshold; at the device, verifying that the first and second user identifiers identify a same person if the correlation score is greater than or equal to the predetermined correlation threshold, and if a step of transferring the second user identifier was executed within a predetermined time interval from the step of transferring the first user identifier; and issuing an indication according to a verifying step. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for verifying a user, the system comprising:
-
a first component for transferring a first user identifier from a first source; a second component for transferring a second user identifier from a second source, the first source different from the second source and the first user identifier different from the second user identifier; the first source comprising a first media and the second source comprising a second media; a predetermined time limit between the first component transferring and the second component transferring; the first and second user identifiers not stored in the system prior to the first and second components transferring the respective first and second user identifiers; a third component for comparing first user identifier portions extracted from the first user identifier and second user identifier portions extracted from the second user identifier and for determining a correlation score responsive thereto, such that comparing and determining are not executed external to the system; and a fourth component for verifying that the first and second user identifiers identify a same person if the correlation score is greater than or equal to a predetermined correlation threshold and if a time interval between the first component transferring and the second component transferring is less than the predetermined time limit.
-
Specification