Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information
First Claim
Patent Images
1. A method, comprising:
- receiving, by a centralized computer, personal information for a first person from a source, wherein the personal information for the first person includes first historical biometric information;
receiving, by the centralized computer, a request to authenticate a person, wherein the request to authenticate includes second biometric information;
comparing, by the centralized computer, the second biometric information with the first historical biometric information;
determining, by the centralized computer, a similarity measure based on the comparison of the second biometric information with the first historical biometric information; and
determining, by the centralized computer, whether to authenticate the person and whether the first and second biometric information is trusted biometric information based on the similarity measure, wherein the determination of whether to authenticate the person and whether the first and second biometric information is trusted biometric information is based on the similarity measure and an amount of time between when the first historical biometric was captured and when the received second biometric information was captured, and wherein the determination of whether to authenticate the person and whether the first and second biometric information is trusted biometric information comprisescomparing, by the centralized computer, the determined similarity measure to a similarity measure threshold, wherein the similarity measure threshold is adjusted based on the amount of time between when the first historical biometric was captured and when the received second biometric information was captured.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of identifying biometric information as trusted and authenticating persons using trusted biometric information are provided. Biometric information can be identified as trusted by comparing it to other biometric information and/or based on the age of the biometric information and/or receiving correct answers to questions based on personal information. Once biometric information has been identified as trusted it can be used as part of an authentication process by receiving biometric information from a person to be authenticated and comparing the received biometric information with the trusted biometric information.
68 Citations
29 Claims
-
1. A method, comprising:
-
receiving, by a centralized computer, personal information for a first person from a source, wherein the personal information for the first person includes first historical biometric information; receiving, by the centralized computer, a request to authenticate a person, wherein the request to authenticate includes second biometric information; comparing, by the centralized computer, the second biometric information with the first historical biometric information; determining, by the centralized computer, a similarity measure based on the comparison of the second biometric information with the first historical biometric information; and determining, by the centralized computer, whether to authenticate the person and whether the first and second biometric information is trusted biometric information based on the similarity measure, wherein the determination of whether to authenticate the person and whether the first and second biometric information is trusted biometric information is based on the similarity measure and an amount of time between when the first historical biometric was captured and when the received second biometric information was captured, and wherein the determination of whether to authenticate the person and whether the first and second biometric information is trusted biometric information comprises comparing, by the centralized computer, the determined similarity measure to a similarity measure threshold, wherein the similarity measure threshold is adjusted based on the amount of time between when the first historical biometric was captured and when the received second biometric information was captured. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
receiving, by a centralized computer, personal information for a first person from a source, wherein the personal information for the first person includes first historical biometric information; receiving, by the centralized computer, a request to authenticate a person, wherein the request to authenticate includes second biometric information; comparing, by the centralized computer, the second biometric information with the first historical biometric information; determining, by the centralized computer, a similarity measure based on the comparison of the second biometric information with the first historical biometric information; and determining, by the centralized computer, whether to authenticate the person and whether the first and second biometric information is trusted biometric information based on the similarity measure, wherein the determination of whether to authenticate the person and whether the first and second biometric information is trusted biometric information is based on the similarity measure and an amount of time between when the first historical biometric was captured and when the received second biometric information was captured, wherein the determination of whether to authenticate the person and whether the first and second biometric information is trusted biometric information comprises comparing, by the centralized computer, the determined similarity measure to a similarity measure threshold; and comparing, by the centralized computer, the amount of time between when the first historical biometric was captured and when the received second biometric information was captured to a time period threshold, wherein the person is authenticated and the first and second biometric information are identified as trusted biometric information when the determined similarity measure is greater than or equal to the similarity measure threshold and the amount of time between when the first historical biometric was captured and when the received second biometric information was captured is greater than or equal to the time period threshold. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification