Methods and systems for identity management
First Claim
Patent Images
1. An identity management system to authenticate the identity of an individual, comprising:
- a vetting workstation to verify the identity of the individual and generate identification data;
an enrollment workstation to enroll the individual whose identity has been verified, to issue an identification token, and generate identification data; and
a core system networked with the vetting workstation and the enrollment workstation to provide a central clearinghouse for the storage and exchange of identification data.
7 Assignments
0 Petitions
Accused Products
Abstract
This invention provides systems and methods for the processing and handling of enrollment, authentication, and subsequent verification of the identity of passengers and employees or workers in the transportation industry by pre-enrolling the individual to collect, among other things, personal information. The collected information is vetted through a series of background checks. Upon satisfactory completion of the background checks, the individual is enrolled into the system and is issued an identity token.
141 Citations
26 Claims
-
1. An identity management system to authenticate the identity of an individual, comprising:
-
a vetting workstation to verify the identity of the individual and generate identification data;
an enrollment workstation to enroll the individual whose identity has been verified, to issue an identification token, and generate identification data; and
a core system networked with the vetting workstation and the enrollment workstation to provide a central clearinghouse for the storage and exchange of identification data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An identity management process for authenticating the identity of an individual, comprising:
-
pre-enrolling the individual in an identity management system by collecting personal information submitted by the individual and storing the information in a database;
vetting the individual by authenticating the personal information through at least one database of at least one of law enforcement, government and background checking organizations;
enrolling the individual into the identity management system;
comparing personal information collected during pre-enrolling to data collected during enrolling;
vetting the individual by conducting at least a background check of the individual; and
issuing an identification token to the individual. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer usable program embodied on a computer usable medium having computer readable program code means, comprising:
-
pre-enrolling an individual in the identity management system by recording personal information submitted by the individual;
enrolling the individual into the identity management system;
vetting the individual by authenticating personal data through the query of a plurality of databases including law enforcement, government and background checking organizations; and
issuing an identity token to the individual. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification