Method of evaluating credentials of individuals and associated apparatus
First Claim
1. A computerized method evaluating credentials of an individual comprising receiving credentials relating to said individual, obtaining from at least one third party information regarding whether said credentials are authentic, if said credentials are authentic, approving said individual for certification of said credentials, and permitting remote access to said credentials through a computer
0 Assignments
0 Petitions
Accused Products
Abstract
A computerized method of authenticating credentials of an individual includes receiving credentials relating to the individual, obtaining from a third party authentication of said credentials, accepting or rejecting an individual based upon the authentication results and permitting remote access to credentials of approved or accepted individuals to confirm certification of the credentials by the authenticating agency. The accepted individual may be provided with indicia showing certification or approval by the authenticating agency. In another embodiment of the invention, third parties may be permitted access to the authenticating agency'"'"'s website in order to enable them to obtain credentials on a number of accepted individuals with searches being conducted on any of a number of fields, such as individual name, occupation, geographic location and the like. Related computerized apparatus is provided.
8 Citations
28 Claims
-
1. A computerized method evaluating credentials of an individual comprising
receiving credentials relating to said individual, obtaining from at least one third party information regarding whether said credentials are authentic, if said credentials are authentic, approving said individual for certification of said credentials, and permitting remote access to said credentials through a computer
-
20. Apparatus for authenticating credentials of an individual comprising
a computer for receiving credentials relating to said individual, said computer being structured to send inquiries regarding authenticity of said credentials to information sources and receive responses to said inquiries, and said computer being structured to compare said responses with stored credentials of said individual and make a determination regarding whether to approve or reject said individual for certification of authenticity based upon said responses.
Specification