Verification of a person identifier received online
First Claim
Patent Images
1. A computer-implemented method of verifying a first person identifier, executed by a verification system realized by one or more computers connected to a data network, the method comprising:
- Receiving a Verification Request including the first person identifier in a first message sent via the data network by a first sender; and
Estimating, by use of a data processor, whether Verification Conditions are true, the Verification Conditions including;
whether the first person identifier and a second person identifier satisfy a Same Person Condition, the second person identifier being received in a second message at a different time from a time when the first message is received, the second message being sent via the data network by a second sender, wherein the Same Person Condition is satisfied if the first person identifier and the second person identifier have a Same Person Relation that includes at least one relation between the first person identifier and the second person identifier selected from the group consisting of;
the first person identifier and the second person identifier include substantially similar portions,the first person identifier and the second person identifier are verified against encrypted person identifier information stored in a user device, the encrypted person identifier information being accessed upon request to an encrypting authority,the first person identifier and the second person identifier include geographically proximate geographical parameters, andeach of the first person identifier and the second person identifier has a respective Same Person Relation with a third person identifier,whether the first sender and the second sender satisfy a Same Sender Condition, wherein the Same Sender Condition is satisfied if, based on a comparison between information associated with the first message and information associated with the second message, the first message and the second message have a Same Sender Relation that includes at least one relation, between the first message and the second message, selected from the group consisting of;
there is a relation between a reliable network address of the first sender and a reliable network address of the second sender,a first secret known to the first sender and a second secret contained in the second message are derivatives of a common secret, andeach of the first message and the second message has a respective Same Sender Relation with a third message, andwhether the second person identifier, previously determined to satisfy a Same Person Condition in relation to the first person identifier, identifies the second sender, previously determined to satisfy a Same Sender Condition in relation to the first sender.
3 Assignments
0 Petitions
Accused Products
Abstract
A_system and method for verification of a person identifier received online is described. The method includes receiving a request for verifying a person identifier (PI1); and estimating whether (a) PI1 identifies the same person as another person identifier (PI2), (b) sender of PI1 is the same person as sender of PI2, and (c) PI2 identifies the sender of PI2.
-
Citations
32 Claims
-
1. A computer-implemented method of verifying a first person identifier, executed by a verification system realized by one or more computers connected to a data network, the method comprising:
-
Receiving a Verification Request including the first person identifier in a first message sent via the data network by a first sender; and Estimating, by use of a data processor, whether Verification Conditions are true, the Verification Conditions including; whether the first person identifier and a second person identifier satisfy a Same Person Condition, the second person identifier being received in a second message at a different time from a time when the first message is received, the second message being sent via the data network by a second sender, wherein the Same Person Condition is satisfied if the first person identifier and the second person identifier have a Same Person Relation that includes at least one relation between the first person identifier and the second person identifier selected from the group consisting of; the first person identifier and the second person identifier include substantially similar portions, the first person identifier and the second person identifier are verified against encrypted person identifier information stored in a user device, the encrypted person identifier information being accessed upon request to an encrypting authority, the first person identifier and the second person identifier include geographically proximate geographical parameters, and each of the first person identifier and the second person identifier has a respective Same Person Relation with a third person identifier, whether the first sender and the second sender satisfy a Same Sender Condition, wherein the Same Sender Condition is satisfied if, based on a comparison between information associated with the first message and information associated with the second message, the first message and the second message have a Same Sender Relation that includes at least one relation, between the first message and the second message, selected from the group consisting of; there is a relation between a reliable network address of the first sender and a reliable network address of the second sender, a first secret known to the first sender and a second secret contained in the second message are derivatives of a common secret, and each of the first message and the second message has a respective Same Sender Relation with a third message, and whether the second person identifier, previously determined to satisfy a Same Person Condition in relation to the first person identifier, identifies the second sender, previously determined to satisfy a Same Sender Condition in relation to the first sender. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer-implemented system for verifying a first person identifier comprising:
-
A Receiver for receiving a Verification Request including the first person identifier in a first message sent via a data network by a first sender; and A Verification Estimator for estimating whether Verification Conditions are true, the Verification Conditions including;
whether the first person identifier and a second person identifier satisfy a Same Person Condition, the second person identifier being received in a second message at a different time from a time when the first message is received, the second message being sent via the data network by a second sender, wherein the Same Person Condition is satisfied if the first person identifier and the second person identifier have a Same Person Relation that includes at least one relation between the first person identifier and the second person identifier selected from the group consisting of;
the first person identifier and the second person identifier include substantially similar portions, the first person identifier and the second person identifier are verified against encrypted person identifier information stored in a user device, the encrypted person identifier information being accessed upon request to an encrypting authority, the first person identifier and the second person identifier include geographically proximate geographical parameters, and each of the first person identifier and the second person identifier has a respective Same Person Relation with a third person identifier, whether the first sender and the second sender satisfy a Same Sender Condition, wherein the Same Sender Condition is satisfied if, based on a comparison between information associated with the first message and information associated with the second message, the first message and the second message have a Same Sender Relation that includes at least one relation, between the first message and the second message, selected from the group consisting of;
there is a relation between a reliable network address of the first sender and a reliable network address of the second sender, a first secret known to the first sender and a second secret contained in the second message are derivatives of a common secret, and each of the first message and the second message has a respective Same Sender Relation with a third message, and whether the second person identifier, previously determined to satisfy a Same Person Condition in relation to the first person identifier, identifies the second sender, previously determined to satisfy a Same Sender Condition in relation to the first sender. - View Dependent Claims (27, 28, 29, 30, 31, 32)
-
Specification