System for processing an even request by determining a matching user profile based on user identifying information
First Claim
1. A system for processing electronic events, whereby the system provides validation of identity, the system comprising:
- a computer apparatus including a processor and a memory; and
a software module stored in the memory, comprising executable instructions that when executed by the processor cause the processor to;
identify a set of profiles associated with a set of users;
for each profile of the set of profiles, identify a set of identity information;
for each profile of the set of profiles, validate the set of identity information;
receive an event request, wherein the event request comprises user identifying information;
compare the user identifying information with the sets of identity information of the set of profiles;
determine a matching profile from the set of profiles based on comparing the user identifying information and the sets of identity information of the set of profiles, wherein the matching profile is associated with a user;
in response to determining the matching profile, process the event request;
generate an authentication code in response to processing the event request;
associate the generated authentication code with the event request;
notify the user of the event request;
determine that a device of the user is within a defined distance of an authentication location and, based on determining that the device of the user is within the defined distance of the authentication location, automatically transmit the generated authentication code to the device of the user;
receive a key code from a computing device, wherein the computing device receives the key code as an input from the user;
compare the received key code with the generated authentication code;
determine a match between the received key code and generated authentication code; and
in response to determining the match between the received key code and generated authentication code, complete the event request.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is an event processing and identity validation system. The system typically includes a processor, a memory, and an event processing and identity validation module stored in the memory. The system is typically configured for: validating a set of identity information for each profile of a set of profiles, receiving an event request comprising user identifying information, comparing the user identifying information with the sets of identity information of the set of profiles to determine a matching profile, processing the event request by generating an authentication code, notifying the user of the event request, determining that a device of the user is within a defined distance of an authentication location and automatically transmitting the generated authentication code to the device of the user, receiving a key code from a computing device, and determining a match between the key code and the authentication code to complete the event request.
44 Citations
20 Claims
-
1. A system for processing electronic events, whereby the system provides validation of identity, the system comprising:
-
a computer apparatus including a processor and a memory; and a software module stored in the memory, comprising executable instructions that when executed by the processor cause the processor to; identify a set of profiles associated with a set of users; for each profile of the set of profiles, identify a set of identity information; for each profile of the set of profiles, validate the set of identity information; receive an event request, wherein the event request comprises user identifying information; compare the user identifying information with the sets of identity information of the set of profiles; determine a matching profile from the set of profiles based on comparing the user identifying information and the sets of identity information of the set of profiles, wherein the matching profile is associated with a user; in response to determining the matching profile, process the event request; generate an authentication code in response to processing the event request; associate the generated authentication code with the event request; notify the user of the event request; determine that a device of the user is within a defined distance of an authentication location and, based on determining that the device of the user is within the defined distance of the authentication location, automatically transmit the generated authentication code to the device of the user; receive a key code from a computing device, wherein the computing device receives the key code as an input from the user; compare the received key code with the generated authentication code; determine a match between the received key code and generated authentication code; and in response to determining the match between the received key code and generated authentication code, complete the event request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9)
-
-
8. A computer program product for processing electronic events, wherein the computer program product comprises a non-transitory computer-readable storage medium having computer-executable instructions to:
-
identify a set of profiles associated with a set of users; for each profile of the set of profiles, identify a set of identity information; for each profile of the set of profiles, validate the set of identity information; receive an event request, wherein the event request comprises user identifying information; compare the user identifying information with the sets of identity information of the set of profiles; determine a matching profile from the set of profiles based on comparing the user identifying information and the sets of identity information of the set of profiles, wherein the matching profile is associated with a user; in response to determining the matching profile, process the event request; generate an authentication code in response to processing the event request; associate the generated authentication code with the event request; notify the user of the event request; determine that a device of the user is within a defined distance of an authentication location and, based on determining that the device of the user is within the defined distance of the authentication location, automatically transmit the generated authentication code to the device of the user; receive a key code from a computing device, wherein the computing device receives the key code as an input from the user; compare the received key code with the generated authentication code; determine a match between the received key code and generated authentication code; and in response to determining the match between the received key code and generated authentication code, complete the event request. - View Dependent Claims (10, 11, 12, 13, 15)
-
-
14. A method for validating identity and processing electronic events, wherein the method comprises:
-
identifying a set of profiles associated with a set of users; for each profile of the set of profiles, identifying a set of identity information; for each profile of the set of profiles, validating the set of identity information; receiving an event request, wherein the event request comprises user identifying information; comparing the user identifying information with the sets of identity information of the set of profiles; determining a matching profile from the set of profiles based on comparing the user identifying information and the sets of identity information of the set of profiles, wherein the matching profile is associated with a user; in response to determining the matching profile, processing the event request; generating an authentication code in response to validating the event request; associating the generated authentication code with the event request; notifying the user of the event request; determining that a device of the user is within a defined distance of an authentication location and, based on determining that the device of the user is within the defined distance of the authentication location, automatically transmit the generated authentication code to the device of the user; receiving a key code from a computing device, wherein the computing device receives the key code as an input from the user; comparing the received key code with the generated authentication code; determining a match between the received key code and generated authentication code; and in response to determining the match between the received key code and generated authentication code, completing the event request. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification