Verification Authentication System and Method
First Claim
1. A verification authentication system authorizing a user to access information, the system comprising:
- a first content;
a verifying unit;
a user identity, the first content and the identity verified by the verifying unit; and
a computer authentication system including, at least one database, a processor, a memory operatively coupled to the processor, a generator module which executes in the processor, from the memory, where logic is configured to cause the generation of a second content upon receiving the first content inputted from the verifying unit, wherein access is provided to the user after authentication of the second content and the first content stored on the at least one database, correspond.
0 Assignments
0 Petitions
Accused Products
Abstract
A verification authentication system and method is provided. The verification authentication system verifies and authenticates a user seeking access to use or information. The verification authentication system is comprised of a first content and user identity, a verifying unit, and a computer authentication system. The first content and identity are verified and inputted into the computer authentication system by the verifying unit. The computer authentication system includes at least one database, a processor, a memory operatively coupled to the processor, a generator module which executes in the processor, from the memory, where logic is configured to cause the generation of a corresponding second content. In order to access use or information, the user inputs the second content into the computer authentication system. The first content and the second content are authenticated within the system and information is provided.
16 Citations
22 Claims
-
1. A verification authentication system authorizing a user to access information, the system comprising:
-
a first content; a verifying unit; a user identity, the first content and the identity verified by the verifying unit; and a computer authentication system including, at least one database, a processor, a memory operatively coupled to the processor, a generator module which executes in the processor, from the memory, where logic is configured to cause the generation of a second content upon receiving the first content inputted from the verifying unit, wherein access is provided to the user after authentication of the second content and the first content stored on the at least one database, correspond. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of verifying and authenticating a user to access information, the method comprising:
-
receiving a first content and an identity to a verifying unit; verifying the first content and the identity; receiving the first content by an computer authentication system comprising, at least one database, a processor, a memory operatively coupled to the processor, a generator module which executes in the processor, from the memory, where logic is configured to cause the generation of a second content upon receiving a first content; and authenticating the user, wherein access is provided to the user after the second content and the first content, stored within the database, correspond. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification