Determining Identity Of Individuals Using Authenticators

  • Published: May 7, 2015
  • Earliest Priority: Nov 01 2013
  • Family: 6
  • Cited Works: 0
  • Cited by: 66
  • Cites: 4
  • Additional Info: Full text

Systems are provided that allow users to access resources in a manner that addresses inherent deficiencies in existing authentication systems. During a typical authentication process, the system may connect the user to one or more authenticators in real time through a variety of communications channels so that the authenticators may verify that the user is who he/she purports to be. In this way, a user may be authenticated and allowed to complete transactions that require access to protected resources/transactions. In some embodiments, the system may automatically identify authenticators for a user via an onboarding process by searching the user's electronic files, accessing social and professional networking sites, searching one or more credit reporting databases, or other such means. Based upon the determinations made by the authenticators, and other factors, such as the trust scores assigned to authenticators, an authentication engine may be used to calculate a confidence score regarding the user's identity that may be utilized in determining whether to grant the user access to protected resources/transactions.

Download PDF
Document Preview
Document History
  • Publication: May 7, 2015
  • Application: Oct 31, 2014
    US US 201414530168 A
  • Priority: Oct 31, 2014
    US US 201414530168 A
  • Priority: Nov 1, 2013
    US US 201361898891 P

Download Citation

Sign in to the Lens