Method and System to Validate Identity Without Putting Privacy at Risk
First Claim
1. A method for authenticating a user, the method comprising:
- the user transferring a first user identifier disposed on a first media to a device;
the user transferring a second user identifier disposed on a second media to the device, the first media different from the second media and the first user identifier different from the second user identifier;
the first and second user identifiers not stored in the device prior to steps of transferring;
analyzing the first and second user identifiers at the device without sending the first and second user identifiers external to the device;
at the device, determining a correlation score responsive to the analyzing step, the correlation score indicative that the first and the second user identifiers identify a same user;
at the device determining a relationship between the correlation score and a predetermined correlation threshold and responsive thereto determining whether the first and second user identifiers represent the same user; and
authenticating the user if the first and second user identifiers identify the same user.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system to verify identity while protecting private data. To locally verify identity without requiring communication with an external database or passing personal/identity information over network connections. To create a database and/or statistical model for later use to verify identify, private information from a first media is input to a device. Private information subsequently presented via a second media is then verified locally by comparing to the private information previously captured from the first media. If the resultant correlation score is sufficiently high the private information from the first media and from the second media are determined to belong to the same individual, and the user is authenticated or a desired action is approved. In case of a low correlation score, a notification may be sent to one or more entities alerting authorities of a security breach or identity theft.
0 Citations
20 Claims
-
1. A method for authenticating a user, the method comprising:
-
the user transferring a first user identifier disposed on a first media to a device; the user transferring a second user identifier disposed on a second media to the device, the first media different from the second media and the first user identifier different from the second user identifier; the first and second user identifiers not stored in the device prior to steps of transferring; analyzing the first and second user identifiers at the device without sending the first and second user identifiers external to the device; at the device, determining a correlation score responsive to the analyzing step, the correlation score indicative that the first and the second user identifiers identify a same user; at the device determining a relationship between the correlation score and a predetermined correlation threshold and responsive thereto determining whether the first and second user identifiers represent the same user; and authenticating the user if the first and second user identifiers identify the same user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for authenticating a user, the method comprising:
-
the user supplying a user identifier disposed on a first media to a device; the user supplying a biometric to the device; the user identifier and the biometric not stored in the device prior to respective steps of supplying; analyzing the user identifier and the biometric at the device without sending the user identifier and the biometric external to the device; at the device, determining a correlation score responsive to the analyzing step; determining a relationship between the correlation score and a predetermined correlation threshold and responsive thereto determining whether the user identifier and the biometric represent a same user; and authenticating the user if the user identifier and the biometric identify the same user. - View Dependent Claims (19, 20)
-
Specification