Method and apparatus for reducing on-line fraud using personal digital identification
First Claim
1. A method for reducing the occurrence of unauthorized use of on-line resources, comprising:
- receiving a message indicating a request from a user to use on-line resources;
determining whether the request requires authentication;
obtaining an indicia of physical identification from the user if authentication is required;
comparing the obtained indicia to a stored indicia for the user; and
enabling the request to be fulfilled if the obtained indicia matches the stored indicia.
1 Assignment
0 Petitions
Accused Products
Abstract
A distributed Personal Digital Identification (PDI) system and architecture rapidly verifies individuals using biometric data or other tokens prior to approving a transaction and/or granting access to an on-line services and other network services. The architecture that includes a server that has access to template data required to authenticate individuals, and the processing capacity to route authenticated requests to the appropriate downstream entity (Internet Service Provider, Credit Card Company, etc.). The server is connected to requesting users by various network methods to form a client/server architecture. The server and clients each contain discrete subsystems, which provide various levels of authentication services to users of the system.
-
Citations
45 Claims
-
1. A method for reducing the occurrence of unauthorized use of on-line resources, comprising:
-
receiving a message indicating a request from a user to use on-line resources;
determining whether the request requires authentication;
obtaining an indicia of physical identification from the user if authentication is required;
comparing the obtained indicia to a stored indicia for the user; and
enabling the request to be fulfilled if the obtained indicia matches the stored indicia. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An apparatus for reducing the occurrence of unauthorized use of on-line resources, comprising:
-
means for receiving a message indicating a request from a user to use on-line resources;
means for determining whether the request requires authentication;
means for obtaining an indicia of physical identification from the user if authentication is required;
means for comparing the obtained indicia to a stored indicia for the user; and
means for enabling the request if the obtained indicia matches the stored indicia. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. An apparatus for reducing the occurrence of unauthorized use of on-line resources, comprising:
-
a server that is adapted to communicate with a network based service so as to receive a message indicating a request from a user to use the network based service;
a rules subsystem coupled to the server that determines whether the request requires authentication, and causes the server to obtain an indicia of physical identification from the user if authentication is required; and
an authentication subsystem coupled to the server and the controller that compares the obtained indicia to a stored indicia for the user, wherein the server sends a signal to the network based service that the request is to be fulfilled if the authentication subsystem determines that the obtained indicia matches the stored indicia. - View Dependent Claims (40, 41, 42, 43, 44, 45)
-
Specification