Systems and methods for high fidelity multi-modal out-of-band biometric authentication through vector-based multi-profile storage
First Claim
Patent Images
1. A method for authenticating a user, comprising:
- receiving, from an electronic device, authentication data, the authentication data comprising user biometric data;
at least one computer processor comparing the authentication data to a plurality of existing user profiles;
the at least one computer processor selecting an algorithm and at least one authentication threshold for each of the plurality of existing profiles;
the at least one computer processor calculating a confidence score using the selected algorithm for each comparison with each of the plurality of existing profiles;
the at least one computer processor comparing each confidence score to the selected authentication threshold for each of the plurality of existing profiles; and
calculating a combined metric for the plurality of confidence scores.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for generating multiple biometric profiles for a user is disclosed. According to one embodiment, the method may include (1) receiving data from a user, the data comprising biometric data for a user and device specifications for the electronic device; (2) at least one computer processor retrieving at least one existing user profile; (3) the at least one computer processor determining whether the data is consistent with at least one of the existing profiles; and (4) the at least one computer processor updating at least one existing profile if the data is consistent with the existing profile.
-
Citations
13 Claims
-
1. A method for authenticating a user, comprising:
-
receiving, from an electronic device, authentication data, the authentication data comprising user biometric data; at least one computer processor comparing the authentication data to a plurality of existing user profiles; the at least one computer processor selecting an algorithm and at least one authentication threshold for each of the plurality of existing profiles; the at least one computer processor calculating a confidence score using the selected algorithm for each comparison with each of the plurality of existing profiles; the at least one computer processor comparing each confidence score to the selected authentication threshold for each of the plurality of existing profiles; and calculating a combined metric for the plurality of confidence scores. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification