Customer identification verification process
First Claim
1. A system, comprising:
- a server device including;
a first memory; and
one or more first processors, operatively connected to the first memory, configured to;
receive a request for a service from a requestor user device;
obtain, from the requestor user device, one or more real-time characteristics of the requestor user device based on an interaction between the requestor user device and a provider user device,the real-time characteristics of the requestor user device being based on at least one of;
a time associated with the interaction, or
a location of the requestor user device associated with the interaction;
generate a verification token by encrypting verification information associated with the requestor user device using the one or more real-time characteristics of the requestor user device as encryption information;
provide the verification token to the requestor user device; and
provide the verification information to the provider user device; and
the provider user device including;
a second memory; and
one or more second processors, operatively connected to the second memory, configured to;
receive the verification information from the server device;
receive the verification token from the requestor user device that was generated by the server device;
decrypt the verification token using one or more real-time characteristics of the provider user device to obtain decrypted verification information, the real-time characteristics of the provider user device being based on at least one of;
the time associated with the interaction, ora location of the provider user device associated with the interaction; and
verify the requestor user device, in connection with performance of the service, based on whether the decrypted verification information matches the verification information received from the server device.
1 Assignment
0 Petitions
Accused Products
Abstract
An example device may include one or more processors to receive a request for a service from a requestor user device; provide transaction information associated with the service to a provider user device, where the transaction information may include location information corresponding to a location at which the service may be provided; obtain verification information from the requestor user device based on an interaction associated with the requestor user device or the provider user device at the location, where the verification information may include one or more characteristics of the requestor user device; generate a verification token based on the one or more characteristics of the requestor user device; provide the verification token to the requestor user device; and provide the verification information to the provider user device to permit the provider user device to verify the requestor user device, in connection with performance of the service, based on receiving the verification information and obtaining the verification token from the requestor user device.
-
Citations
20 Claims
-
1. A system, comprising:
-
a server device including; a first memory; and one or more first processors, operatively connected to the first memory, configured to; receive a request for a service from a requestor user device; obtain, from the requestor user device, one or more real-time characteristics of the requestor user device based on an interaction between the requestor user device and a provider user device, the real-time characteristics of the requestor user device being based on at least one of;
a time associated with the interaction, or
a location of the requestor user device associated with the interaction;generate a verification token by encrypting verification information associated with the requestor user device using the one or more real-time characteristics of the requestor user device as encryption information; provide the verification token to the requestor user device; and provide the verification information to the provider user device; and the provider user device including; a second memory; and one or more second processors, operatively connected to the second memory, configured to; receive the verification information from the server device; receive the verification token from the requestor user device that was generated by the server device; decrypt the verification token using one or more real-time characteristics of the provider user device to obtain decrypted verification information, the real-time characteristics of the provider user device being based on at least one of; the time associated with the interaction, or a location of the provider user device associated with the interaction; and verify the requestor user device, in connection with performance of the service, based on whether the decrypted verification information matches the verification information received from the server device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium storing instructions, the instructions comprising:
-
one or more instructions that, when executed by one or more first processors of a server device, cause the one or more first processors to; receive a request for a service from a requestor user device; obtain, from the requestor user device, one or more real-time characteristics of the requestor user device based on an interaction between the requestor user device and a provider user device, the real-time characteristics of the requestor user device being based on at least one of; a time associated with the interaction, or a location of the requestor user device associated with the interaction; generate a verification token by encrypting verification information associated with the requestor user device using the one or more real-time characteristics of the requestor user device as encryption information; provide the verification token to the requestor user device; provide the verification information to the provider user device; and one or more instructions that, when executed by one or more second processors of the provider user device, cause the one or more second processors to; receive the verification information from the server device; receive the verification token from the requestor user device that was generated by the server device; decrypt the verification token using one or more real-time characteristics of the provider user device to obtain decrypted verification information, the real-time characteristics of the provider user device being based on at least one of; the time associated with the interaction, or a location of the provider user device associated with the interaction; and verify the requestor user device, in connection with performance of the service, based on whether the decrypted verification information matches the verification information received from the server device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
receiving, by a server device, a request for a service from a requestor user device; obtaining, by the server device and from the requestor user device, one or more real-time characteristics of the requestor user device based on an interaction between the requestor user device and a provider user device, the real-time characteristics of the requestor user device being based on at least one of; a time associated with the interaction, or a location of the requestor user device associated with the interaction; providing, by the server device, verification information to the provider user device to facilitate providing the service; generating, by the server device, a verification token by encrypting the verification information associated with the requestor user device using the one or more real-time characteristics of the requestor user device as encryption information; providing, by the server device, the verification token to the requestor user device; receiving, by the provider user device, the verification information from the server device; receiving, by the provider user device, the verification token from the requestor user device that was generated by the server device; decrypting, by the provider user device, the verification token using one or more real-time characteristics of the provider user device to obtain decrypted verification information, the real-time characteristics of the provider user device being based on at least one of; the time associated with the interaction, or a location of the provider user device associated with the interaction; receiving, by the server device, a verification confirmation from the provider user device indicating that the provider user device verified the requestor user device based on whether the decrypted verification information matches the verification information received from the server device; and processing, by the server device, a transaction associated with the service based on receiving the verification information. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification