IDENTIFICATION VERIFICATION WITH USER CHALLENGE
First Claim
1. A computer-implemented method comprising:
- sending, by an online service provider system to a user, a request for;
a name; and
user identifying information associated with the provided name;
querying, by the online service provider system, a trusted database based on the provided name and the user identifying information;
determining, by the online service provider system, based on a result of the query, if a match exists in the database between the provided name and the user identifying information;
in the event a match exists, presenting, by the online service provider system, a challenge to the user, the challenge being based on the user identifying information;
determining, by the online service provider system, a verification status of the user'"'"'s identity based on a result of the challenge; and
designating, by the online service provider system, the user'"'"'s identity as verified or unverified in accordance with the verification status.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for conducting user identity verification are disclosed. An example method includes requesting, from a user, a name and user identifying information associated with the provided name. The example method also includes querying a trusted database based on the provided name and the user identifying information and determining if a match exists in the database between the provided name and the user identifying information. In the event a match exists, the example method includes presenting a challenge to the user, the challenge being based on the user identifying information and determining a verification status of the user'"'"'s identity based on a result of the challenge. The example method further includes designating the user'"'"'s identity as verified or unverified in accordance with the verification status.
-
Citations
19 Claims
-
1. A computer-implemented method comprising:
-
sending, by an online service provider system to a user, a request for; a name; and user identifying information associated with the provided name; querying, by the online service provider system, a trusted database based on the provided name and the user identifying information; determining, by the online service provider system, based on a result of the query, if a match exists in the database between the provided name and the user identifying information; in the event a match exists, presenting, by the online service provider system, a challenge to the user, the challenge being based on the user identifying information; determining, by the online service provider system, a verification status of the user'"'"'s identity based on a result of the challenge; and designating, by the online service provider system, the user'"'"'s identity as verified or unverified in accordance with the verification status. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product tangibly embodied on a computer-readable medium and including executable instructions that, when executed, are configured to cause one or more data processing apparatuses to:
-
request, from a user; a name; and user identifying information associated with the provided name; query a trusted database based on the provided name and the user identifying information; determine if a match exists in the database between the provided name and the user identifying information; in the event a match exists, presenting a challenge to the user, the challenge being based on the user identifying information; determine a verification status of the user'"'"'s identity based on a result of the challenge; and designate the user'"'"'s identity as verified or unverified in accordance with the verification status. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a server configured to provide online services to one or more users; one or more computer-readable media including machine-executable instructions; one or more instruction processors configured to execute at least a portion of the machine-executable instructions stored in the computer-readable media, wherein execution of the instructions, in response to a request from a user for access to the online services, results in; requesting, from the user; a name; and user identifying information associated with the provided name; querying a trusted database based on the provided name and the user identifying information; determining if a match exists in the database between the provided name and the user identifying information; in the event a match exists, presenting a challenge to the user, the challenge being based on the user identifying information; determining a verification status of the user'"'"'s identity based on a result of the challenge; and designating the user'"'"'s identity as verified or unverified in accordance with the verification status.
-
Specification