Method and system for verifying identity
First Claim
1. A method for verifying an identity of a purported user, comprising:
- providing a first key and a second key to a user;
providing a first system and a second system different from the first system with a management master ID of the user;
saving the first key and the management master ID but not the second key at the first system;
saving the second key and the management master ID but not the first key at the second system; and
after the first key and second key providing and savings steps;
transmitting to the first system from a purported user a purported first key but not a purported second key;
receiving at the first system the purported first key from the purported user;
comparing at the first system the purported first key to the first key;
confirming at the first system that the purported first key matches the first key;
if matching of the purported first key with the first key is confirmed, issuing at the first system a one-time ID associated with the purported user to the purported user;
associating the one-time ID with the management master ID of the user at the first system;
transmitting the one-time ID associated with the management master ID of the user from the first system to the second system;
saving the one-time ID associated with the management master ID of the user at the second system;
transmitting to the second system from the purported user a purported second key and a purported one-time ID but not the purported first key;
receiving at the second system the purported second key and the purported one-time ID from the purported user;
comparing at the second system the purported second key to the second key;
comparing at the second system the purported one-time ID to the one-time ID;
confirming at the second system that purported second key matches the second key;
confirming at the second system that the purported one-time ID matches the one-time ID; and
if matching of both the purported second key with the second key and the purported one-time ID with the one-time ID is confirmed, confirming that the purported user is the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Verification facilitating company or companies X and verifying company or companies (e.g., credit service company or companies) Y may respectively manage member ID(s) and password(s) of user(s) 1 in mutually separate and mutually secret fashion. User(s) 1 may send member ID(s) to verification facilitating company or companies X from mobile telephone(s) 2, and verification facilitating company or companies X may use originating telephone number(s) and/or member ID(s) to carry out first-stage identity check(s). In the event of positive verification of identity as a result of such identity check(s), verification facilitating company or companies X may issue one-time ID(s) to user(s) 1 and may communicate such one-time ID(s) to verifying company or companies (e.g., credit service company or companies) Y. User(s) 1 may send one-time ID(s) and password(s) to verifying company or companies (e.g., credit service company or companies) Y from company or companies (e.g., store or stores) Z. Verifying company or companies (e.g., credit service company or companies) Y may use one-time ID(s) and password(s) to carry out second-stage identity check(s), and in the event of positive verification of identity as a result of such identity check(s), may provide credit transaction processing or other such service(s).
29 Citations
19 Claims
-
1. A method for verifying an identity of a purported user, comprising:
-
providing a first key and a second key to a user; providing a first system and a second system different from the first system with a management master ID of the user; saving the first key and the management master ID but not the second key at the first system; saving the second key and the management master ID but not the first key at the second system; and after the first key and second key providing and savings steps; transmitting to the first system from a purported user a purported first key but not a purported second key; receiving at the first system the purported first key from the purported user; comparing at the first system the purported first key to the first key; confirming at the first system that the purported first key matches the first key; if matching of the purported first key with the first key is confirmed, issuing at the first system a one-time ID associated with the purported user to the purported user; associating the one-time ID with the management master ID of the user at the first system; transmitting the one-time ID associated with the management master ID of the user from the first system to the second system; saving the one-time ID associated with the management master ID of the user at the second system; transmitting to the second system from the purported user a purported second key and a purported one-time ID but not the purported first key; receiving at the second system the purported second key and the purported one-time ID from the purported user; comparing at the second system the purported second key to the second key; comparing at the second system the purported one-time ID to the one-time ID; confirming at the second system that purported second key matches the second key; confirming at the second system that the purported one-time ID matches the one-time ID; and if matching of both the purported second key with the second key and the purported one-time ID with the one-time ID is confirmed, confirming that the purported user is the user. - View Dependent Claims (2, 3, 4, 5, 6, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
7. The method of claimed 1,
wherein the first key in the purported first key are member IDs; - and
wherein the second key and purported second key are passwords.
- and
-
16. An apparatus for verifying an identity of a purported user, comprising:
-
a first system; and a second system different from the first system, the first and second systems being configured for; providing a first key and a second key to a user; providing the first system and the second system with a management master ID of the user; saving the first key and the management master ID but not the second key at the first system; saving the second key and the management master ID but not the first key at the second system; and after the first key and second key providing and saving steps; transmitting to the first system from a purported user a purported first key but not a purported second key; receiving at the first system the purported first key from the purported user; comparing at the first system the purported first key to the first key; confirming at the first system that the purported first key matches the first key; if matching of the purported first key with the first key is confirmed, issuing at the first system a one-time ID associated with the purported user to the purported user; associating the one-time ID with the management master ID of the user at the first system; transmitting the one-time ID associated with the management master ID of the user from the first system to the second system; saving the one-time ID associated with the management master ID of the user at the second system; transmitting to the second system from the purported user a purported second key and a purported one-time ID but not the purported first key; receiving at the second system the purported second key and the purported one-time ID from the purported user; comparing at the second system the purported second key to the second key; comparing at the second system the purported one-time ID to the one-time ID; confirming at the second system that purported second key matches the second key; confirming at the second system that the purported one-time ID matches the one-time ID; and if matching of both the purported second key with the second key and the purported one-time ID with the one-time ID is confirmed, confirming that the purported user is the user. - View Dependent Claims (17, 18, 19)
-
Specification