Methods, systems, and products for identity verification
First Claim
Patent Images
1. A method of verifying an identity of a person, comprising:
- receiving a request for verification from a device, the request for verification comprising a set of rules supplied by a requestor that determines how strictly the identity of the person is verified;
retrieving a signature associated with the device;
determining the signature is stale;
acquiring multiple signatures from the device representing presences of multiple devices;
comparing only the multiple signatures to a constellation of reference signatures historically received from the device according to the set of rules; and
when the multiple signatures match the constellation of reference signatures, then verifying the identity of the person carrying the device.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and products are disclosed for identification verification. A signature, representing the presence of a device, is acquired. The signature is compared to a reference signature. When the signature favorably compares to the reference signature, then the identity of a user associated with the device is verified.
-
Citations
20 Claims
-
1. A method of verifying an identity of a person, comprising:
-
receiving a request for verification from a device, the request for verification comprising a set of rules supplied by a requestor that determines how strictly the identity of the person is verified; retrieving a signature associated with the device; determining the signature is stale; acquiring multiple signatures from the device representing presences of multiple devices; comparing only the multiple signatures to a constellation of reference signatures historically received from the device according to the set of rules; and when the multiple signatures match the constellation of reference signatures, then verifying the identity of the person carrying the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for verifying identity, comprising:
-
a processor executing code stored in memory that causes the processor to; receive a request for verification from a device, the request for verification comprising a set of rules supplied by a requestor that specifies a membership set for a work day for verifying the identity of a single user; retrieve a signature associated with the device; determine the signature is stale; acquire a new set of identification numbers sent by the device that represent presences of multiple radio frequency identification devices; query a database of signatures that stores identification numbers that have been historically received from the device on the work day; retrieve an historical set of identification numbers that are historically associated with the device on the work day; match the new set of identification numbers to the historical set of identification numbers; verify the identity of the single user when the new set of identification numbers matches the historical set of identification numbers on the work day; and authorize a financial transaction using the identity of the single user carrying the device. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A non-transitory computer readable medium storing computer-readable instructions for performing a method, the method comprising:
-
receiving a request for verification from a device, the request for verification comprising a set of rules supplied by a requestor that specifies a membership set for a work day for verifying the identity of a single user; retrieving a signature associated with the device; determining the signature is stale; acquiring a new set of identification numbers sent by the device that represent presences of multiple radio frequency identification devices; querying a database of signatures that stores identification numbers that have been historically received from the device on the work day; retrieving an historical set of identification numbers associated with the device; comparing the set of identification numbers to the historical set of identification numbers; verifying the identify of the single user when the new set of identification numbers matches the historical set of identification numbers; and authorizing a financial transaction using the identity of the single user associated with the device. - View Dependent Claims (18, 19, 20)
-
Specification