Method and system for conducting background investigations
First Claim
Patent Images
1. A method for authenticating identity, comprising:
- receiving a request for a background investigation on a target individual from a requester;
verifying an identity of the target individual before performing the investigation; and
verifying an identity of the requestor before performing the background investigation.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for conducting background investigations is provided. The system present may a user interface to a user. A request for a service may be received via the user interface. The request for a service may include a request that a background investigation be performed on an individual. Initial information regarding a target of the investigation may be received. Based on the initial information, an identity of the target may be verified. If the identity of the target is verified, the investigation may be performed.
-
Citations
21 Claims
-
1. A method for authenticating identity, comprising:
-
receiving a request for a background investigation on a target individual from a requester;
verifying an identity of the target individual before performing the investigation; and
verifying an identity of the requestor before performing the background investigation. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving a request from a requestor for a background investigation on a target;
receiving initial information regarding the target from the requester;
verifying an identity of the target based at least on the initial information; and
conducting the background investigation if the identity of the target is verified. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A case management tool for managing background investigations, comprising:
-
an account module for establishing an account for a search requester, the account a listing of including pending and completed background investigation and status; and
a verification module for receiving a request for verification of target from the search requester, wherein the request includes information that can identify the target and for performing a verification process for the target'"'"'s identity based at least on the information in the request. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification