High Assurance Remote Identity Proofing
First Claim
1. A computer implemented method for verifying an individual'"'"'s claimed identity by aggregating multiple personal identity attributes comprising the following steps:
- Collecting by a camera-enabled and network-connected access device, personally identifiable attributes from an individual claiming a specific identity (Claimant);
Verifying, by the computer processor, Claimant data by transmitting the collected identity attributes to multiple identity verification services;
Evaluating, by the computer processor, the responses that are returned from the identity verification services;
Scoring, by the computer processor, the identity verification responses and their subsequent evaluations into an identity assurance scorecard that is unique for each Claimant;
0 Assignments
0 Petitions
Accused Products
Abstract
Remote identity proofing is the process of uniquely verifying an individual who is a party to an online transaction. This presents an enormous challenge to the secure delivery of government services as well as online commerce. The degree of difficulty is compounded when attempting to remotely authenticate for the first time a previously unknown individual. The High Assurance Remote Identity Proofing method introduces a holistic approach to solving this problem. A rich collection of identity data, when evaluated by multiple verification methods, can be aggregated to an identity assurance score, which is a measure of the uniqueness and authenticity of a claimed identity and ultimately provides a high assurance that someone attempting to remotely verify his or her identity is who he or she claims to be.
-
Citations
14 Claims
-
1. A computer implemented method for verifying an individual'"'"'s claimed identity by aggregating multiple personal identity attributes comprising the following steps:
-
Collecting by a camera-enabled and network-connected access device, personally identifiable attributes from an individual claiming a specific identity (Claimant); Verifying, by the computer processor, Claimant data by transmitting the collected identity attributes to multiple identity verification services; Evaluating, by the computer processor, the responses that are returned from the identity verification services; Scoring, by the computer processor, the identity verification responses and their subsequent evaluations into an identity assurance scorecard that is unique for each Claimant; - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification