Systems and methods for verifying user attributes
First Claim
1. A computer-implemented method for verifying user attributes, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- receiving a request to verify an attribute of a user who claims to be a particular person;
determining that the attribute can be verified using a trusted record that is associated with the particular person and is maintained by an entity that verified the identity of the particular person prior to creating the trusted record;
determining that the trusted record is associated with a vehicle to which the particular person has access rights;
confirming that the user is able to physically access the vehicle by performing an access-validation check that demonstrates the user'"'"'s ability to physically access the vehicle; and
in response to confirming that the user has physical access to the vehicle, validating the user as the particular person and using the trusted record to verify the attribute of the user.
6 Assignments
0 Petitions
Accused Products
Abstract
The disclosed computer-implemented method for verifying user attributes may include (1) receiving a request to verify an attribute of a user who claims to be a particular person, (2) determining that the attribute can be verified using a trusted record that is associated with the particular person, (3) determining that the trusted record is associated with a vehicle to which the particular person has access rights, (4) confirming that the user has physical access to the vehicle by performing an access-validation check, and (5) in response to confirming that the user has physical access to the vehicle, using the trusted record to verify the attribute of the user. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
20 Claims
-
1. A computer-implemented method for verifying user attributes, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
receiving a request to verify an attribute of a user who claims to be a particular person; determining that the attribute can be verified using a trusted record that is associated with the particular person and is maintained by an entity that verified the identity of the particular person prior to creating the trusted record; determining that the trusted record is associated with a vehicle to which the particular person has access rights; confirming that the user is able to physically access the vehicle by performing an access-validation check that demonstrates the user'"'"'s ability to physically access the vehicle; and in response to confirming that the user has physical access to the vehicle, validating the user as the particular person and using the trusted record to verify the attribute of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for verifying user attributes, the system comprising:
-
a receiving module, stored in memory, that receives a request to verify an attribute of a user who claims to be a particular person; a determination module, stored in memory, that; determines that the attribute can be verified using a trusted record that is associated with the particular person and is maintained by an entity that verified the identity of the particular person prior to creating the trusted record; and determines that the trusted record is associated with a vehicle to which the particular person has access rights; a confirmation module, stored in memory, that confirms the user'"'"'s ability to physically access the vehicle by performing an access-validation check that demonstrates the user'"'"'s ability to physically access the vehicle; a verification module, stored in memory, that, in response to confirming that the user has physical access to the vehicle, validates the user as the particular person and uses the trusted record to verify the attribute of the user; and at least one physical processor configured to execute the receiving module, the determination module, the confirmation module, and the verification module. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium comprising one or more computer-readable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
receive a request to verify an attribute of a user who claims to be a particular person; determine that the attribute can be verified using a trusted record that is associated with the particular person and is maintained by an entity that verified the identity of the particular person prior to creating the trusted record; determine that the trusted record is associated with a vehicle to which the particular person has access rights; confirm that the user is able to physically access the vehicle by performing an access-validation check that demonstrates the user'"'"'s ability to physically access the vehicle; and in response to confirming that the user has physical access to the vehicle, validate the user as the particular person and use the trusted record to verify the attribute of the user.
-
Specification