Personal criteria verification using fractional information
First Claim
Patent Images
1. A method, comprising:
- receiving, at a computing system of a service provider, a first partial identifying data item for an individual requesting access to a resource, wherein the first partial identifying data item includes less information than a respective full identifying data item for the individual;
accessing, by the computer system, a first set of one or more records associated with individuals having attributes matching the first partial identifying data item;
determining, by the computer system, whether the first set of one or more records satisfies a sufficiency criterion of the service provider for granting access to the resource; and
wherein the service provider does not have access to information sufficient to determine an identity of the individual requesting access to the resource at the computing system.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for verifying the identity of users connected to a computer network comprises providing fractional information queries to users, wherein responses to these individual queries are not sufficient to identify the user. This method further comprises receiving responses to these fractional information queries and comparing these responses to data available from within a computer network. A set of potential matches to the user is generated according to these responses and is used in determining whether the set of potential matches is sufficient to identify the user.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, at a computing system of a service provider, a first partial identifying data item for an individual requesting access to a resource, wherein the first partial identifying data item includes less information than a respective full identifying data item for the individual; accessing, by the computer system, a first set of one or more records associated with individuals having attributes matching the first partial identifying data item; determining, by the computer system, whether the first set of one or more records satisfies a sufficiency criterion of the service provider for granting access to the resource; and wherein the service provider does not have access to information sufficient to determine an identity of the individual requesting access to the resource at the computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
receiving, at a computing system of a service provider, a partial identifying data item for an individual submitting a request, wherein the partial identifying data item is a portion of a respective full identifying data item for the individual; determining, by the computing system, whether a set of one or more records satisfies a sufficiency criterion of the service provider for granting the request, wherein the set of one or more records is associated with individuals having attributes matching the partial identifying data item; and wherein the service provider does not have access to information sufficient to determine an identity of the individual submitting the request at the computing system. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
a computer system of an external data source receiving, from a computer system of a service provider, a request for one or more records associated with individuals having attributes matching a partial data item that is a portion of a complete data item corresponding to an individual requesting access to a computer resource; the computer system of the external data source providing the one or more records to the computer system of the service provider, wherein the one or more records are usable by the computer system of the service provider to determine whether a sufficiency criterion of the service provider is satisfied in order to grant the individual access to the computer resource; wherein the one or more records of the external data source provided to the computer system of the service provider are not sufficient to determine an identity of the individual requesting access to the computer resource. - View Dependent Claims (18, 19, 20)
-
Specification