IDENTITY VERIFICATION CREDENTIAL WITH CONTINUOUS VERIFICATION AND INTENTION-BASED AUTHENTICATION SYSTEMS AND METHODS
First Claim
1. A method for facilitating the authentication and verification of a user by creating and maintaining a true online credential (TOC), the method comprising:
- receiving, at one of a plurality of network servers, a request from a client terminal to create a true online credential (TOC) for a user, said request containing a plurality of personally identifiable information of said user;
constructing, at one of said plurality of network servers, at least one knowledge-based-authentication (KBA) question based on said plurality of personally identifiable information and a plurality of third-party data sources;
transmitting, at one of said plurality of network servers, at least one Knowledge-based-authentication (KBA) question to said client terminal to be answered by said user;
receiving, at one of said plurality of network servers, a response from said client terminal to said at least one Knowledge-based-authentication (KBA) question;
computing, at one of said plurality of network servers, an identity verification score for said user;
transmitting, at one of said plurality of network servers, a request to said client terminal requesting permission from said user to access a plurality of second-party user data contained within a plurality of second-party data sources if said identity verification score exceeds a minimum identity verification score threshold.
0 Assignments
0 Petitions
Accused Products
Abstract
A system providing features for facilitating the authentication and verification of a consumer, facilitating and sharing trust between the consumer and third parties, and for continuously updating such information. The system can create an online identity credential based on verifying the identity of an individual subject. The system can include adding first, second, and third party information to the credential, analyzing the data in the credential to create metadata stored within the credential, continuously and periodically updating the elements and metadata of the identity credential, and for sharing selected data and metadata elements of the credential with second and third parties. The system can be used as a standalone identity credential or in support of biometric identity applications. The system can include rewards to encourage subjects to continuously verify their identity. The system can include a Knowledge-Based-Authentication based on intention analysis derived from second-party data, rather than factual third-party data.
-
Citations
19 Claims
-
1. A method for facilitating the authentication and verification of a user by creating and maintaining a true online credential (TOC), the method comprising:
-
receiving, at one of a plurality of network servers, a request from a client terminal to create a true online credential (TOC) for a user, said request containing a plurality of personally identifiable information of said user; constructing, at one of said plurality of network servers, at least one knowledge-based-authentication (KBA) question based on said plurality of personally identifiable information and a plurality of third-party data sources; transmitting, at one of said plurality of network servers, at least one Knowledge-based-authentication (KBA) question to said client terminal to be answered by said user; receiving, at one of said plurality of network servers, a response from said client terminal to said at least one Knowledge-based-authentication (KBA) question; computing, at one of said plurality of network servers, an identity verification score for said user; transmitting, at one of said plurality of network servers, a request to said client terminal requesting permission from said user to access a plurality of second-party user data contained within a plurality of second-party data sources if said identity verification score exceeds a minimum identity verification score threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of facilitating and sharing trust between a user and a third party, the method comprising:
-
creating a true online credential (TOC) for a user; adding first, second, and third party data to said TOC; analyzing said first, second, and third party data in said TOC to create a plurality of metadata stored within said TOC; updating said metadata of the identity credential periodically; and sharing selected first, second, and third party data and selected metadata in said TOC with a third party, wherein said sharing of sharing selected first, second, and third party data and selected metadata in said TOC with a third party facilitates trust between said user and said third party. - View Dependent Claims (16, 17, 18, 19)
-
Specification