Online Identity Management and Identity Verification
First Claim
1. A user identity verification method comprising the steps of:
- collecting in a computer database consolidated user data comprising information about a method user from a plurality of sources selected from the group consisting of credit bureau information, information from data vendors, and public information;
generating a profile of the method user comprising a plurality of subsets of the consolidated user data corresponding to a plurality of access levels;
receiving a validation request from a third party source at an unknown user'"'"'s request;
assigning an access level to the validation request;
requesting information from the unknown user;
matching returned information from the unknown user to that in the subset of the consolidated user data corresponding to the assigned access level; and
verifying to the third party source that the unknown user is the method user; and
wherein the method steps are performed by one or more processors.
0 Assignments
0 Petitions
Accused Products
Abstract
A user identity verification apparatus and method comprising, via one or more processors, collecting in a computer database consolidated user data comprising information about a method user from a plurality of sources comprising credit bureau information, information from data vendors, and public information, generating a profile of the method user comprising a plurality of subsets of the consolidated user data corresponding to a plurality of access levels, receiving a validation request from a third party source at an unknown user'"'"'s request; assigning an access level to the validation request; requesting information from the unknown user, matching returned information from the unknown user to that in the subset of the consolidated user data corresponding to the assigned access level, and verifying to the third party source that the unknown user is the method user.
206 Citations
20 Claims
-
1. A user identity verification method comprising the steps of:
-
collecting in a computer database consolidated user data comprising information about a method user from a plurality of sources selected from the group consisting of credit bureau information, information from data vendors, and public information; generating a profile of the method user comprising a plurality of subsets of the consolidated user data corresponding to a plurality of access levels; receiving a validation request from a third party source at an unknown user'"'"'s request; assigning an access level to the validation request; requesting information from the unknown user; matching returned information from the unknown user to that in the subset of the consolidated user data corresponding to the assigned access level; and verifying to the third party source that the unknown user is the method user; and wherein the method steps are performed by one or more processors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A user identity verification apparatus comprising:
-
a computer database of consolidated user data comprising information about a apparatus user from a plurality of sources selected from the group consisting of credit bureau information, information from data vendors, and public information; and one or more processors generating a profile of the apparatus user comprising a plurality of subsets of the consolidated user data corresponding to a plurality of access levels, receiving a validation request from a third party source at an unknown user'"'"'s request, assigning an access level to the validation request, requesting information from the unknown user, matching returned information from the unknown user to that in the subset of the consolidated user data corresponding to the assigned access level, and verifying to the third party source that the unknown user is the apparatus user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification