METHOD AND APPARATUS FOR REMOTE IDENTITY PROOFING SERVICE ISSUING TRUSTED IDENTITIES
First Claim
1. A method according to a set of instructions stored on the memory of a computing device, the method comprising:
- receiving, by a processor of the computing device, a request to verify an identity from an applicant device, wherein the request comprises;
a request for trusted identity information andauthentication information associated with the identity;
comparing, by the processor, the authentication information to stored identity information according to one or more identity proofing requirements;
determining, by the processor, a failed match between the authentication information and the stored identity information; and
initiating, by the processor, based on the determination of the failed match, a real time video communication session between the applicant device and a registration authority device configured to allow a registration authority to inspect identification information for determining a match between the identification information and the stored identity information.
0 Assignments
0 Petitions
Accused Products
Abstract
Illustrative methods, processes, and software are disclosed herein that remotely prove the identity of individuals fully compliant with identity proofing standards and policies. The embodiments may utilize photo identification and government identities using networked capabilities and capabilities within a process for end-to-end fully remote identity proofing followed by the automated provisioning and issuance of a trusted identity and optional credentials. In alternative manifestations the embodiments use automated government identity lookups including but not limited to digital imagery equipment with artificial intelligence and pattern recognition to detect fraudulent physical identification articles remotely, electronic scans of magnetic stripes and other electronic markers on government-issued identification media including but not limited to drivers licenses, government employee identities, passports, or other government-issued identities combined with real-time lookup in trusted databases. In alternative manifestations the embodiments use multiple biometric form factors for proofing, registration, recognition, and authentication.
-
Citations
25 Claims
-
1. A method according to a set of instructions stored on the memory of a computing device, the method comprising:
-
receiving, by a processor of the computing device, a request to verify an identity from an applicant device, wherein the request comprises; a request for trusted identity information and authentication information associated with the identity; comparing, by the processor, the authentication information to stored identity information according to one or more identity proofing requirements; determining, by the processor, a failed match between the authentication information and the stored identity information; and initiating, by the processor, based on the determination of the failed match, a real time video communication session between the applicant device and a registration authority device configured to allow a registration authority to inspect identification information for determining a match between the identification information and the stored identity information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable medium having instructions stored thereon that, upon execution by a computing device, cause the computing device to perform operations, wherein the instructions comprise:
-
instructions to receive a request to verify an identity from an applicant device, wherein the request comprises; a request for trusted identity information and authentication information associated with the identity; instructions to compare the authentication information to stored identity information according to one or more identity proofing requirements; instructions to determine a failed match between the authentication information and the stored identity information; and instructions to initiate, based on the determination of the failed match, a real time video communication session between the applicant device and a registration authority device configured to allow a registration authority to inspect identification information for determining a match between the identification information and the stored identity information. - View Dependent Claims (15, 16)
-
-
17. An apparatus comprising:
-
a memory; a processor coupled to the memory; and a first set of instructions stored on the memory and configured to be executed by the processor, wherein the processor is configured to; receive a request to verify an identity from an applicant device, wherein the request comprises; a request for trusted identity information and authentication information associated with the identity; compare the authentication information to stored identity information according to one or more identity proofing requirements; determine a failed match between the authentication information and the stored identity information; and initiate, based on the determination of the failed match, a real time video communication session between the applicant device and a registration authority device configured to allow a registration authority to inspect identification information for determining a match between the identification information and the stored identity information. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
Specification