Methods, systems, and products for identity verification
First Claim
Patent Images
1. A method, comprising:
- receiving, by a server, a request to verify an identity claimed by a person associated with a mobile device;
sending, by the server, an interrogation instruction to the mobile device, the interrogation instruction instructing the mobile device to transmit an interrogation signal to a radio frequency tag;
receiving, by the server, a tag identifier sent from the mobile device, the tag identifier sent from the radio frequency tag to the mobile device in response to a transmission of the interrogation signal;
retrieving, by the server, information historically associated with the identity;
determining, by the server, that the tag identifier sent from the radio frequency tag satisfies the information historically associated with the identity; and
verifying, by the server, the identity claimed by the person associated with the mobile device in response to the tag identifier satisfying the information.
5 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and products verify an identity claimed by a person. A signature, representing the presence of a device, is acquired. The signature is compared to a reference signature. Should the signature favorably compare to the reference signature, then the identity is verified.
38 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a server, a request to verify an identity claimed by a person associated with a mobile device; sending, by the server, an interrogation instruction to the mobile device, the interrogation instruction instructing the mobile device to transmit an interrogation signal to a radio frequency tag; receiving, by the server, a tag identifier sent from the mobile device, the tag identifier sent from the radio frequency tag to the mobile device in response to a transmission of the interrogation signal; retrieving, by the server, information historically associated with the identity; determining, by the server, that the tag identifier sent from the radio frequency tag satisfies the information historically associated with the identity; and verifying, by the server, the identity claimed by the person associated with the mobile device in response to the tag identifier satisfying the information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a hardware processor; and a memory device, the memory device storing instructions, the instructions when executed causing the hardware processor to perform operations, the operations comprising; receiving a request to verify an identity associated with a mobile device; sending an interrogation instruction to the mobile device, the interrogation instruction instructing the mobile device to transmit an interrogation signal to a radio frequency tag; receiving a tag identifier sent from the mobile device, the tag identifier uniquely identifying the radio frequency tag in response to a transmission of the interrogation signal; retrieving a historical tag identifier that is historically associated with the identity associated with the mobile device; determining that the tag identifier sent from the mobile device satisfies the historical tag identifier historically associated with the identity; and verifying the identify associated with the mobile device in response to the tag identifier satisfying the historical tag identifier. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A memory device storing executable instructions that, when executed by a hardware processor, facilitate performance of operations, the operations comprising:
-
receiving a request sent via the Internet to verify an identity claimed by a person carrying a mobile device; sending an interrogation instruction via a cellular network to the mobile device, the interrogation instruction instructing the mobile device to wirelessly transmit an electromagnetic interrogation signal to radio frequency tags; receiving tag identifiers sent via the cellular network from the mobile device, the tag identifiers sent from the radio frequency tags to the mobile device in response to a transmission of the electromagnetic interrogation signal; retrieving historical tag identifiers that are historically associated with the identity claimed by the person; retrieving a strictness of comparison associated with the identify; determining that the tag identifiers satisfy the historical tag identifiers according to the strictness of comparison associated with the identity; and verifying the identify claimed by the person carrying the mobile device in response to the tag identifiers satisfying the historical tag identifiers according to the strictness of comparison. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification