Methods and systems for identifying, verifying, and authenticating an identity
First Claim
1. A machine-implemented method of authenticating the identity of a user who is a human being, the method comprising:
- registering the user, wherein registering the user comprises receiving identification of a plurality of persons associated with the user and a communication address for each of the plurality of persons;
receiving a request to authenticate the identity of the user;
selecting at least one of the plurality of persons to serve as an authentication agent;
initiating at least a first communication between the user and the authentication agent via the communication address, wherein the first communication is live between the user and the authentication agent;
receiving a second communication from the authentication agent; and
sending a message indicating the identity of the user is authenticated based at least in part on the second communication including a confirmation of the identity of the user.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating the identity of a user is disclosed. The method may include registering a user, where registering the user includes receiving identification of a plurality of individuals associated with the user and a communication address for each of the plurality of individuals. The method may also include receiving a request to authenticate the identity of the user. The method may further include selecting at least one of the plurality of individuals to serve as an authentication agent. The method may additionally include initiating at least a first communication between the user and the authentication agent via the communication address. The method may moreover include receiving a second communication from the authentication agent. The method may furthermore include sending a message indicating the identity of the user is authenticated based at least in part on the second communication including a confirmation of the identity of the user.
-
Citations
20 Claims
-
1. A machine-implemented method of authenticating the identity of a user who is a human being, the method comprising:
-
registering the user, wherein registering the user comprises receiving identification of a plurality of persons associated with the user and a communication address for each of the plurality of persons; receiving a request to authenticate the identity of the user; selecting at least one of the plurality of persons to serve as an authentication agent; initiating at least a first communication between the user and the authentication agent via the communication address, wherein the first communication is live between the user and the authentication agent; receiving a second communication from the authentication agent; and sending a message indicating the identity of the user is authenticated based at least in part on the second communication including a confirmation of the identity of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium containing instructions stored thereon for implementing a method of authenticating the identity of a user of a client device, wherein the user is a human being, and the method comprises:
-
sending, from the client device to a remote server, a request to authenticate the identity of the user; receiving, at the client device from the remote server, a first instruction to initiate at least a first communication between the user and a first authentication agent, wherein; the first authentication agent is a first person; and the first communication is live between the user and the authentication agent; initiating, with the client device, the first communication; and receiving, at the client device from the remote server, a message indicating the identity of the user is authenticated based at least in part on a second communication received by the remote server from the first authentication agent confirming the identity of the user. - View Dependent Claims (16, 17)
-
-
18. A server configured to authenticate the identity of a user who is a human being, the server comprising:
-
a processor; and a storage medium comprising instructions executable by the processor for; receiving a request to authenticate the identity of the user; selecting at least one of a plurality of persons to serve as an authentication agent; initiating at least a first communication between the user and the authentication agent, wherein the first communication is live between the user and the authentication agent; receiving a second communication from the authentication agent; and sending a message indicating the identity of the user is authenticated based at least in part on the second communication including a confirmation of the identity of the user. - View Dependent Claims (19, 20)
-
Specification