System and method to curb identity theft
First Claim
1. A “
- complex-data-item”
that is formed by combining one of the identity-identifiers of a person with a series of digits and/or characters that is changeable from time-to-time, the latter being referred to as identity-password(s).
0 Assignments
0 Petitions
Accused Products
Abstract
Personal identity-identifiers such as social security numbers, finger prints, and biometric identifiers are fixed for life; once disclosed they can not reliably be used to authenticate the identity of a person claiming to own the identity-identifier(s). This limitation is overcome by introduction of one or more identity-passwords that are related, attached, or commingled together through a preset “rule”. Authentication methodologies claimed by this invention use a three-way-cross-authentication among three entities; a person to be authenticated, an entity requesting the authentication, and a trustee that issues, keeps, and verifies identity-data. Such methodologies can trace back the entitlement of one or more identity-identifiers to its correct owner through a three-way-cross-match of its identity-passwords. Specific methods are described to authenticate one'"'"'s social security number, credit card number, door pass, computer software licenses, and the like. Another method is described that eliminates the need for business to ask for peoples'"'"' identity-identifiers.
68 Citations
8 Claims
-
1. A “
- complex-data-item”
that is formed by combining one of the identity-identifiers of a person with a series of digits and/or characters that is changeable from time-to-time, the latter being referred to as identity-password(s). - View Dependent Claims (2, 3, 4, 5)
- complex-data-item”
-
6. A three way method of authentication that is performed by the interaction of three independent entities amongst themselves, to compare and verify all component data elements that comprise a complex-data-item, comprising
a. initiation of an identity authentication process by an entity that needs to learn the result of an intended identity authentication; -
b. asking a person whose identity is to be authenticated to disclose or input to the entity that is to perform the identity authentication i. one or more of the person'"'"'s identity-identifier(s), ii then current identity-password(s) that is/are associated with identity-identifier(s), iii a predetermined, set “
rule”
, if any, that associate or combine the identity data items being operated on;
c. a trustee organization that i. has been supplied with, or is in possession of a person'"'"'s full or partial identity-identifier(s) to be authenticated, ii. is aware or has been furnished with current identity-password(s) to be used in the identity-authentication process, iii. is the one to have set the “
rule”
used in the make up of a complex-data-item, and/or is being furnished the “
rule”
, andiv. is charged with the task of reporting a “
true”
or “
false”
authentication result to the requesting entity, at the conclusion of the requested identity-authentication process. - View Dependent Claims (7)
-
-
8. A method by which an assortment of required identity-password(s), identity-identifier(s), value of a “
- rule-flag”
, and/or a complex-data-item are input, stored, processed, and/or transmitted to the trustee for identity-authentication by means of a detachable (USB) memory-processor-module when connected to a host device such as a cell-phone, PDA, computer, door opener and the like that is capable of capturing personal and/or biometric attribute(s) and to transmit the said identity-data-stream via wired or wireless means.
- rule-flag”
Specification