Systems and methods for identifying biometric information as trusted and authenticating persons using trusted biometric information
First Claim
Patent Images
1. A method, comprising:
- receiving, by a centralized computer, personal information for a first person from a plurality of independent sources, wherein the personal information for the first person includes a first historical biometric information from a first one of the plurality of independent sources;
comparing, by the centralized computer, an age of the first historical biometric information to a predetermined age threshold;
identifying, by the centralized computer, the first historical biometric information as first trusted biometric information when the age of the first historical biometric information is greater than or equal to the predetermined age threshold;
receiving, by the centralized computer, a request to authenticate a person, wherein the request to authenticate includes second biometric information;
comparing, by the centralized computer, the second biometric information with the first trusted biometric information;
determining, by the centralized computer, a first similarity measure based on the comparison of the second biometric information with the first trusted biometric information; and
authenticating, by the centralized computer, the person as the first person when the first similarity measure is greater than or equal to a first similarity measure threshold.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of identifying biometric information as trusted and authenticating persons using trusted biometric information are provided. Biometric information can be identified as trusted by comparing it to other biometric information and/or based on the age of the biometric information and/or receiving correct answers to questions based on personal information. Once biometric information has been identified as trusted it can be used as part of an authentication process by receiving biometric information from a person to be authenticated and comparing the received biometric information with the trusted biometric information.
-
Citations
18 Claims
-
1. A method, comprising:
-
receiving, by a centralized computer, personal information for a first person from a plurality of independent sources, wherein the personal information for the first person includes a first historical biometric information from a first one of the plurality of independent sources; comparing, by the centralized computer, an age of the first historical biometric information to a predetermined age threshold; identifying, by the centralized computer, the first historical biometric information as first trusted biometric information when the age of the first historical biometric information is greater than or equal to the predetermined age threshold; receiving, by the centralized computer, a request to authenticate a person, wherein the request to authenticate includes second biometric information; comparing, by the centralized computer, the second biometric information with the first trusted biometric information; determining, by the centralized computer, a first similarity measure based on the comparison of the second biometric information with the first trusted biometric information; and authenticating, by the centralized computer, the person as the first person when the first similarity measure is greater than or equal to a first similarity measure threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
determining, by the centralized computer, whether historical biometric information is available for a first person, wherein when the historical biometric information is not available for the first person the method comprises receiving, by a centralized computer, a request to authenticate a person, wherein the request is received from an application executing on a device in possession of the person and the request includes first biometric information captured from the person and payment credentials for the first person; attempting, by the centralized computer, to authorize payment using the payment credentials; and authenticating, by the centralized computer, the person as the first person when the payment is authorized based on the payment credentials. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
Specification