Online identity management and identity verification
First Claim
1. A user identity verification method comprising the steps of:
- collecting in a computer database consolidated user data comprising information about a method user from a plurality of sources selected from the group consisting of credit bureau information, information from data vendors, and public information;
generating a plurality of profiles of the method user comprising a plurality of subsets of consolidated data of the method user corresponding to a plurality of access levels;
receiving an unknown user'"'"'s validation request;
assigning an access level to the validation request;
requesting information from the unknown user;
matching returned information from the unknown user to that in the subset of the consolidated data of the method user corresponding to the assigned access level; and
verifying that the unknown user is the method user by issuing an icon indicative of verification, the icon issued in a format for use on non-licensed third-party websites; and
wherein the method steps are performed by one or more processors.
0 Assignments
0 Petitions
Accused Products
Abstract
A user identity verification apparatus and method comprising, via one or more processors, collecting in a computer database consolidated user data comprising information about a method user from a plurality of sources comprising credit bureau information, information from data vendors, and public information, generating a profile of the method user comprising a plurality of subsets of the consolidated user data corresponding to a plurality of access levels, receiving a validation request from a third party source at an unknown user'"'"'s request; assigning an access level to the validation request; requesting information from the unknown user, matching returned information from the unknown user to that in the subset of the consolidated user data corresponding to the assigned access level, and verifying to the third party source that the unknown user is the method user.
-
Citations
25 Claims
-
1. A user identity verification method comprising the steps of:
-
collecting in a computer database consolidated user data comprising information about a method user from a plurality of sources selected from the group consisting of credit bureau information, information from data vendors, and public information; generating a plurality of profiles of the method user comprising a plurality of subsets of consolidated data of the method user corresponding to a plurality of access levels; receiving an unknown user'"'"'s validation request; assigning an access level to the validation request; requesting information from the unknown user; matching returned information from the unknown user to that in the subset of the consolidated data of the method user corresponding to the assigned access level; and verifying that the unknown user is the method user by issuing an icon indicative of verification, the icon issued in a format for use on non-licensed third-party websites; and wherein the method steps are performed by one or more processors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A user identity verification apparatus comprising:
-
a computer database of consolidated user data comprising information about an apparatus user from a plurality of sources selected from the group consisting of credit bureau information, information from data vendors, and public information; and one or more processors generating a plurality of profiles of the apparatus user comprising a plurality of subsets of the consolidated data of the apparatus user corresponding to a plurality of access levels, receiving an unknown user'"'"'s validation request, assigning an access level to the validation request, requesting information from the unknown user, matching returned information from the unknown user to that in the subset of the consolidated data of the apparatus user corresponding to the assigned access level, and verifying that the unknown user is the apparatus user by issuing an icon indicative of verification, said icon issued in a format for use on non-licensed third-party websites. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A user identity verification method comprising the steps of:
-
a user submitting personal information of the user to a database; verifying as accurate with a source other than the user at least some of the personal information submitted by the user; issuing to a user, iconic indicia in a format for use on non-licensed third-party websites, the iconic indicia relating to at least one aspect of the information submitted by the user; at least periodically verifying with a source other than the user that at least some of the personal information submitted by the user is accurate; and revoking the user'"'"'s iconic indicia if the data previously verified as accurate and for which the iconic indicia was issued fails a subsequent verification attempt. - View Dependent Claims (24, 25)
-
Specification