Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information
First Claim
Patent Images
1. A method, comprising:
- receiving, by a centralized computer, personal information for a first person from a plurality of independent sources, wherein the personal information for the first person includes first historical biometric information from a first one of the plurality of independent sources and second historical biometric information from a second one of the plurality of independent sources;
comparing, by the centralized computer, the first and second historical biometric information;
determining, by the centralized computer, a first similarity measure based on the comparison of the first and second historical biometric information;
identifying, by the centralized computer, the first and second historical biometric information as trusted first and second biometric information when the first similarity measure is greater than or equal to a first similarity measure threshold;
receiving, by the centralized computer, a request to authenticate a person, wherein the request to authenticate includes third biometric information;
comparing, by the centralized computer, the third biometric information with the first trusted biometric information, the trusted second biometric information, or a composite of at least the first and second trusted biometric information;
determining, by the centralized computer, a second similarity measure based on the comparison of the third biometric information with the first trusted biometric information, the second trusted biometric information, or the composite of at least the first and second trusted biometric information; and
authenticating, by the centralized computer, the person as the first person when the second similarity measure is greater than or equal to a second similarity measure threshold.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of identifying biometric information as trusted and authenticating persons using trusted biometric information are provided. Biometric information can be identified as trusted by comparing it to other biometric information and/or based on the age of the biometric information and/or receiving correct answers to questions based on personal information. Once biometric information has been identified as trusted it can be used as part of an authentication process by receiving biometric information from a person to be authenticated and comparing the received biometric information with the trusted biometric information.
59 Citations
30 Claims
-
1. A method, comprising:
-
receiving, by a centralized computer, personal information for a first person from a plurality of independent sources, wherein the personal information for the first person includes first historical biometric information from a first one of the plurality of independent sources and second historical biometric information from a second one of the plurality of independent sources; comparing, by the centralized computer, the first and second historical biometric information; determining, by the centralized computer, a first similarity measure based on the comparison of the first and second historical biometric information; identifying, by the centralized computer, the first and second historical biometric information as trusted first and second biometric information when the first similarity measure is greater than or equal to a first similarity measure threshold; receiving, by the centralized computer, a request to authenticate a person, wherein the request to authenticate includes third biometric information; comparing, by the centralized computer, the third biometric information with the first trusted biometric information, the trusted second biometric information, or a composite of at least the first and second trusted biometric information; determining, by the centralized computer, a second similarity measure based on the comparison of the third biometric information with the first trusted biometric information, the second trusted biometric information, or the composite of at least the first and second trusted biometric information; and authenticating, by the centralized computer, the person as the first person when the second similarity measure is greater than or equal to a second similarity measure threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method, comprising:
-
receiving, by a centralized computer, personal information for a first person from a plurality of independent sources, wherein the personal information for the first person includes first historical biometric information from a first one of the plurality of independent sources; receiving, by the centralized computer, a request to authenticate a person, wherein the request to authenticate includes second biometric information; comparing, by the centralized computer, the second biometric information with the first historical biometric information; determining, by the centralized computer, a similarity measure based on the comparison of the second biometric information with the first historical biometric information; authenticating, by the centralized computer, the person as the first person when the similarity measure is greater than or equal to a similarity measure threshold; and identifying, by the centralized computer, the first historical biometric information and the second biometric information as first and second trusted biometric information when the similarity measure is greater than or equal to the similarity measure threshold. - View Dependent Claims (23, 24)
-
-
25. A method, comprising:
-
receiving, by a centralized computer, personal information for a first person from a plurality of independent sources, wherein the personal information for the first person includes first historical biometric information from a first one of the plurality of independent sources and second historical biometric information from a second one of the plurality of independent sources; comparing, by the centralized computer, the first and second historical biometric information; determining, by the centralized computer, a first similarity measure based on the comparison of the first and second historical biometric information; identifying, by the centralized computer, the first and second historical biometric information as first and second trusted biometric information when the first similarity measure is greater than or equal to a first similarity measure threshold; identifying, by the centralized computer, a high-risk transaction; initiating, by the centralized computer, a contact using contact information associated with the first person; capturing, by the centralized computer, a third biometric information from a person answering the contact; comparing, by the centralized computer, the third biometric information with the first trusted biometric information, the second trusted biometric information, or a composite of at least the first and second trusted biometric information; determining, by the centralized computer, a third similarity measure based on the comparison of the third biometric information with the first trusted biometric information, the second trusted biometric information, or the composite of at least the first and second trusted biometric information; allowing the high-risk transaction to proceed between the person answer the contact and an information user and authenticating the person answering the contact as the first person when the third similarity measure is greater than or equal to a third similarity measure threshold. - View Dependent Claims (26, 27, 28, 29, 30)
-
Specification