User-level token for user authentication via a user device
First Claim
Patent Images
1. A computer-implemented method performed by an identity verification computing system, the method comprising:
- generating a unique user-level token (ULT) associated with a user-level profile, the user-level profile associated with a user device, the user device associated with a user;
provisioning the user-level token to the user device;
receiving a request to provide an identity verification of the user via an entity computing system, the request including data associated with the user device;
accessing the user-level profile associated with the user device;
obtaining the user-level token from the user device, the user-level token being pulled from the user device, the user-level token associated with the user-level profile, wherein a request for the user-level token includes instructions to the user device to open an application associated with the user-level token and an address to transmit the user-level token to the identity verification computing system, and wherein the user-level token is received from the user device without requiring input to the user device by the user;
validating the user-level token; and
transmitting an identity verification approval to the entity computing system.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer implemented method performed by an identity verification computing system includes receiving a request to provide an identity verification of a user via an entity computing system, the request including data associated with a user device associated with the user. A user-level profile associated with the user device is accessed. A user-level token is requested from the user device. The user-level token is associated with the user-level profile. The user-level token is received from the user device, and validated. An identity verification approval is transmitted to the entity computing system.
29 Citations
26 Claims
-
1. A computer-implemented method performed by an identity verification computing system, the method comprising:
-
generating a unique user-level token (ULT) associated with a user-level profile, the user-level profile associated with a user device, the user device associated with a user; provisioning the user-level token to the user device; receiving a request to provide an identity verification of the user via an entity computing system, the request including data associated with the user device; accessing the user-level profile associated with the user device; obtaining the user-level token from the user device, the user-level token being pulled from the user device, the user-level token associated with the user-level profile, wherein a request for the user-level token includes instructions to the user device to open an application associated with the user-level token and an address to transmit the user-level token to the identity verification computing system, and wherein the user-level token is received from the user device without requiring input to the user device by the user; validating the user-level token; and transmitting an identity verification approval to the entity computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
an entity computing device configured to interface with a user device associated with a user; and an identity verification computing system, comprising a processor and instructions stored in non-transitory machine-readable media, the instructions configured to cause the identity verification computing system to; generate a unique user-level token (ULT) associated with a user-level profile, the user-level profile associated with a user device, the user device associated with a user; provision the user-level token to the user device; receive an identity verification request for the user from the entity computing device, the request comprising data associated with the user device; access the user-level profile associated with the user device; obtain the user-level token from the user device, the user level token being pulled from the user device, the user-level token associated with the user-level profile, wherein a request for the user-level token includes instructions to the user device to open an application associated with the user-level token and an address to transmit the user-level token to the identity verification computing system, and wherein the user-level token is received from the user device without requiring input to the user device by the user; validate the user-level token; and transmit an identity verification approval to the entity computing system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. An identity verification computing system, comprising:
-
a network interface configured to communicate with an entity computing system via a network; an identity database configured to store a plurality of user-level profiles; a memory configured to store instructions; and at least one processor configured to execute the instructions stored on the memory to; generate a unique user-level token (ULT) associated with a user-level profile, the user-level profile associated with a user device, the user device associated with a user; provision the user-level token to the user device; receive an identity request for the user from the entity computing device, the request comprising data associated with the user device; access the user-level profile associated with the user device; request the user-level token from the user device, the user-level token associated with the user-level profile, wherein the request for the user-level token includes instructions to the user device to open an application associated with the user-level token and an address to transmit the user-level token to the identity verification computing system, and wherein the user-level token is received from the user device without requiring input to the user device by the user; receive the user-level token from the user device; validate the user-level token; and transmit an identity verification approval to the entity computing system. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
Specification