Identity verification systems and methods
First Claim
1. A method for authenticating an identity of a user seeking access to data related to the user via a client device in communication with a server, the method comprising the steps of:
- requesting initial authentication data from the user, the initial authentication data comprising wallet information associated with the user;
using the initial authentication data, searching for a data file associated with the user in a database associated with the server, the data file including confidential data associated with the user; and
if the data file is found,sending to the client device a plurality of randomly ordered and selectable options, wherein one of the selectable options corresponds to a correct option comprising an incomplete portion of an item in the data file, and wherein the other selectable options correspond to false options provided in a format similar to the correct option;
receiving a selection from the user of a selected one of the options, andif the selected one of the options is the correct option;
requesting by the server and receiving from the client device additional data entered by the user in an attempt to complete the incomplete portion of the item;
determining by the server whether the additional data entered by the user correctly completes the incomplete portion of the item; and
granting the user access to the data file if the server determines that the additional data entered by the user correctly completes the incomplete portion of the item.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for authenticating the identity of a user prior to giving access to confidential data at a user interface via a network are described. In an exemplary implementation in an Internet environment, a server hosts an application providing selective access by the user to confidential data related to the user. The user provides initial data to the application as part of a request to access the confidential data. At least one database having the confidential data stored therein is accessed by the server to retrieve confidential data relating to the user located in the database based on the initial data received from the client interface. An authentication function causes the server to transmit to the client interface and present to the user an incomplete portion of the confidential data relating to the user, which is not identical to the initial data, along with at least one other portion of data having a substantially identical format to the incomplete portion of the confidential data. The authentication function requests the user to provide additional data to complete the incomplete portion of the confidential data. The user is granted access to the confidential data subsequent to determination by the application that the user correctly completed the incomplete portion of the confidential data.
-
Citations
25 Claims
-
1. A method for authenticating an identity of a user seeking access to data related to the user via a client device in communication with a server, the method comprising the steps of:
-
requesting initial authentication data from the user, the initial authentication data comprising wallet information associated with the user; using the initial authentication data, searching for a data file associated with the user in a database associated with the server, the data file including confidential data associated with the user; and if the data file is found, sending to the client device a plurality of randomly ordered and selectable options, wherein one of the selectable options corresponds to a correct option comprising an incomplete portion of an item in the data file, and wherein the other selectable options correspond to false options provided in a format similar to the correct option; receiving a selection from the user of a selected one of the options, and if the selected one of the options is the correct option; requesting by the server and receiving from the client device additional data entered by the user in an attempt to complete the incomplete portion of the item; determining by the server whether the additional data entered by the user correctly completes the incomplete portion of the item; and granting the user access to the data file if the server determines that the additional data entered by the user correctly completes the incomplete portion of the item. - View Dependent Claims (2, 3, 4, 5, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
6. A non-transitory computer-readable medium having computer-executable instructions for performing steps of a server process for authenticating an identity of a user seeking access to confidential data related to the user over a network via a client interface, the steps comprising:
-
requesting initial authentication data from the user, the initial authentication data comprising wallet information associated with the user; using the initial authentication data, searching for a data file associated with the user in a database associated with the server, the data file comprising confidential data associated with the user; and
if the data file is found,sending to the client device a plurality of randomly ordered and selectable options, wherein one of the selectable options corresponds to a correct option comprising an incomplete portion of an item in the data file, and wherein the other selectable options correspond to false options provided in a format similar to the correct option; receiving a selection from the user of a selected one of the options, and if the selected one of the options is the correct option; requesting by the server and receiving from the client interface additional data entered by the user in an attempt to complete the incomplete portion of the item; determining whether the additional data entered by the user correctly completes the incomplete portion of the item; and granting the user access to the data file including the confidential data associated with the user if the additional data entered by the user correctly completes the incomplete portion of the item. - View Dependent Claims (7, 8)
-
-
9. A non-transitory computer readable medium having software code for execution on a computer processor, for authenticating an identity of a user seeking access to confidential data related to the user over a network via a client device, comprising:
-
a first code segment configured to receive initial authentication data from the user, the initial authentication data comprising wallet information associated with the user; a second code segment configured to search, using the initial authentication data, for a data file associated with the user in at least one database, the data file comprising confidential data of the user; a third code segment configured to transmit to the client device a plurality of randomly ordered and selectable options, wherein one of the selectable options corresponds to a correct option comprising an incomplete portion of an item in the data file, and wherein the other selectable options correspond to false options provided in a format similar to the correct option; a fourth code segment configured to request and receive from the client device a selection from the user of a selected one of the options; a fifth code segment configured to determine whether the selected one of the options is the correct option; a sixth code segment configured to receive from the client device additional data entered by the user to complete the incomplete portion of the item; a seventh code segment configured to determine whether the additional data entered by the user correctly completes the incomplete portion of the item; and an eighth code segment configured to grant the user access to the data file including the confidential data related to the user if the additional data entered by the user correctly completes the incomplete portion of the item.
-
Specification