User-based identification system for social networks
First Claim
1. A method of authentication based on real-time communication, the method comprising:
- accessing a profile comprising information regarding a first person;
collecting a first set of biometric information of the first person during the real-time communication between the first person and a second person, the second person having a threshold level of authentication;
associating, with a processing unit, the first set of biometric information with the profile;
receiving, from the second person, an indication regarding an identity of the first person; and
associating, with the processing unit, a first level of authentication with the profile based, at least in part, on the indication regarding the identity of the first person.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques disclosed herein provide for verifying the identity of a prospective social network member using an authentication process in which one or more existing members of the social network who are knowledgeable of the identity of the prospective member communicate with the prospective member in real time. During the real-time communication, biometric information of the prospective member can be associated with a profile for the prospective member. During or after the real-time communication, the existing member(s) can verify the identity of the prospective member. Once the prospective member'"'"'s identity has been properly verified, the prospective member can be granted access to the social network.
-
Citations
37 Claims
-
1. A method of authentication based on real-time communication, the method comprising:
-
accessing a profile comprising information regarding a first person; collecting a first set of biometric information of the first person during the real-time communication between the first person and a second person, the second person having a threshold level of authentication; associating, with a processing unit, the first set of biometric information with the profile; receiving, from the second person, an indication regarding an identity of the first person; and associating, with the processing unit, a first level of authentication with the profile based, at least in part, on the indication regarding the identity of the first person. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for providing authentication based on real-time communication, the system comprising:
-
means for accessing a profile comprising information regarding a first person; means for collecting a first set of biometric information of the first person during the real-time communication between the first person and a second person, the second person having a threshold level of authentication; means for associating the first set of biometric information with the profile; means for receiving, from the second person, an indication regarding an identity of the first person; and means for associating a first level of authentication with the profile based, at least in part, on the indication regarding the identity of the first person. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A device for providing authentication based on real-time communication, the device comprising:
-
a communication interface; and one or more processors coupled to the communication interface, the one or more processors configured to; access a profile comprising information regarding a first person; collect, via the communication interface, a first set of biometric information of the first person during real-time communication between the first person and a second person, the second person having a threshold level of authentication; associate the first set of biometric information with the profile; receive, from the second person via the communication interface, an indication regarding an identity of the first person; and associate a first level of authentication with the profile based, at least in part, on the indication regarding the identity of the first person. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A non-transitory computer-readable recording medium having instructions embedded thereon for providing authentication based on real-time communication, the instructions including computer-executable code for:
-
accessing a profile comprising information regarding a first person; collecting a first set of biometric information of the first person during real-time communication between the first person and a second person, the second person having a threshold level of authentication; associating the first set of biometric information with the profile; receiving, from the second person, an indication regarding an identity of the first person; and associating a first level of authentication with the profile based, at least in part, on the indication regarding the identity of the first person. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37)
-
Specification