Method and system to authenticate an object
First Claim
1. ) A method for performing identity verification of an individual, the method comprising the steps of receiving data from a plurality of data sources;
- analyzing the received data to verify the identity of the individual; and
automatically representing a result of analyzing the received data with one or more indicators
9 Assignments
0 Petitions
Accused Products
Abstract
The system and methods disclosed herein validate the authenticity of a document and an individual'"'"'s claimed identity. The system and method use a validation facility that is configurable to compare and match characteristics of biometric and non-biometric data presented by an individual with biometric and non-biometric data received from a request to a database or file system holding such information. The determination on the matching characteristics of the data can occur in completely automated fashion without intervention from the user, but user intervention is also possible allowing the user to review and override certain data discrepancies. The validation facility provides a user interface for use by a user to review a determination on the data analysis and instruct the validation facility to override that determination if the user determines the cause of the identity verification failure is within an acceptable criterion.
297 Citations
67 Claims
-
1. ) A method for performing identity verification of an individual, the method comprising the steps of
receiving data from a plurality of data sources; -
analyzing the received data to verify the identity of the individual; and
automatically representing a result of analyzing the received data with one or more indicators - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. ) A method for authenticating an individual, the method comprising the steps of:
-
receiving personal information from the individual, querying a first database holding biometric related information;
querying a second database holding non-biometric information; and
determining authenticity of the individual based on an analysis of the personal information, a response to the query of the first database, and a response to the query of the second database. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. ) A system for validating one or more objects, the system comprises;
-
a first computational device to receive information from the one or more objects, the information received includes biometric data and non-biometric data;
a validation facility to validate the information received from the one or more objects, the validation facility configured to analyze the information received from the one or more objects and provide a plurality of outputs representing a determination on the validity of the one or more objects, each of the plurality of outputs having at least two states. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. ) A method for authenticating an individual, the method comprising the steps of,
receiving personal information of an individual; -
receiving biometric information of the individual;
requesting an analysis of the personal information and the biometric related information to authenticate the individual; and
receiving a result of the analysis, the result providing a determination on the authenticity of the individual. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. ) A computer readable medium holding computer readable instructions for performing a method to verify a characteristic of an individual, the method comprising the steps of
receiving data from a plurality of data sources; -
analyzing the received data to verify the identity of the individual; and
automatically representing a result of analyzing the received data with one or more indicators - View Dependent Claims (42, 43, 44, 45, 46, 47, 48)
-
-
49. ) A computer readable medium holding computer executable instructions for performing a method for authenticating an individual, the method comprising the steps of:
-
receiving personal information from the individual, querying a first database holding biometric related information;
querying a second database holding non-biometric information; and
determining authenticity of the individual based on analysis of the personal information, a response to the query of the first database, and a response to the query of the second database. - View Dependent Claims (50, 51, 52, 53, 54, 55, 56)
-
-
57. ) A computer readable medium holding computer executable instructions for performing a method in a proofing system to authenticate an individual, the method comprising the steps of:
-
receiving personal information of an individual;
receiving biometric information of the individual;
requesting an analysis of the personal information and the biometric related information to authenticate the individual; and
receiving a result of the analysis, the result providing a determination on the authenticity of the individual. - View Dependent Claims (58, 59, 60, 61, 62, 63, 64, 65, 66, 67)
-
Specification