Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System and method for verification of identity

a verification system and identity technology, applied in the field of system and method for verifying identity, can solve the problems of inability to ensure, inability to prevent identity fraud, and inability to ensure various executable software protection schemes, and the prior art methods of computer and internet security, etc., to achieve the effect of preventing identity fraud, ensuring, and ensuring the security of e-commerce-related information and transactions

Inactive Publication Date: 2005-09-29
ELLINGSON JOHN F
View PDF10 Cites 115 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0010] The system of the present invention provides an identity-based access control. It defines the authority and delegation of authority to access information, and provides for accountability. The present invention permits the ordering of goods and services in a secure manner over an open and anonymous environment such as the internet or other insecure network. The present invention further permits the payment for goods and services to be transmitted across an open network without fear of diversion to an unauthorized payee. It permits the delivery of intangible personal property and various electronic products in a secure fashion over such open networks. Additionally, the present invention permits the negotiation and formation of contracts in a secure manner over open networks; permits the conduct of auctions in a practical, reliable and trustworthy manner; permits the execution of guarantees in a trustworthy and reliable manner; permits the handling of various securities transactions, including stock purchases, in a secure fashion; and has the advantage of providing a consistent application programming interface which can be utilized in all types of transactions for ensuring security and authenticity of identities.

Problems solved by technology

Prior art methods of computer and internet security such as cryptographic processes, tokens, dongles, so-called “uncopyable media,” and various executable software protection schemes fail to prevent identity fraud.
Such methods are incapable of ensuring that the person or entity at each end of a transaction is who he says he is.
Because of the anonymous nature of the internet, the security of e-commerce-related information and transactions is a serious problem.
At the center of the problem are those individuals who steal other persons' identities so as to perform fraud, pranks, vandalism, espionage and other illegitimate activities.
Thus, the predominant internet security issue is identity authentication.
At the same time, authentication is generally an early hurdle that the individual must clear to conduct internet transactions with the server.
This, however, is cumbersome and, additionally, passwords can be lost or stolen, particularly written passwords.
Consequently, password-only authentication fails to provide adequate security.
However, many are uncomfortable with the current privacy protections.
Indeed, such fears have been confirmed by actual incidences of identity theft reported by the media.
However, such conventional techniques present many drawbacks.
First, information typically used to verify a user's identity may be lost or stolen and, with existing technology, a criminal may find it easy to obtain such personal information such as the Social Security number, mother's maiden name or date of birth of his intended target.
However, even with biometric systems of the prior art, no attempt is made to cross-reference the user's alphanumeric identity data (i.e., name, address, Social Security number, etc.) against a database of identities which can determine, to a high degree of certainty, whether the alphanumeric identity data being offered with the biometric identity data is suspicious and / or subject to fraud.
Without such cross-checking, a criminal submitting a biometric exemplar together with stolen alphanumeric identity data cannot be recognized as the fraud that he is by the anonymous computer systems which are so prevalent today.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for verification of identity
  • System and method for verification of identity
  • System and method for verification of identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The principles and operation of the system and method of the present invention may be better understood with reference to the drawings and accompanying description. Fraud is epidemic and growing at five to ten times the rate of overall economic growth. This dramatic increase in growth can be largely attributed to the concomitant proliferation of digital systems and the naïve use of “fraud detection” systems.

[0031] Scam artists are knowledgeable about the detection systems and use the detection system's own logic to defeat them. These systems took the seemingly easy route in design and are built upon the detection of “suspect” transactions. Knowing which transactions might be “suspect” is only a starting point—not an end in itself. The best measure of such systems (frequently expensive neural network systems) is their early success followed by massive increases in fraud. This is much like the growth of a bacteria that becomes resistant to antibiotics. The present invention di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for verifying identities comprising an enrollment system having: (i) at least one alphanumeric input device; (ii) at least one biometric input device; (iii) at least one header file database having a plurality of identities; (iv) at least one search engine, said search engine in communication with said header file database such that said search engine first receives an alphanumeric data signal which has been input into said alphanumeric input device by the user, and then searches said database for identities that match the alphanumeric data according to a predetermined first set of criteria; (v) a processor to score the set of identities matched by said search engine according to a predetermined second set of criteria, said processor capable of determining the acceptability or unacceptability of said user's input alphanumeric data based on said score; and (vi) an identity escrow database which is in communication with said processor and receives from said unit an approved identity data signal based on the acceptability of the score, said escrow database additionally in communication with said biometric input device capable of receiving at least one biometric identity data signal input by the user to said biometric input device, said escrow database further comprising means for coupling the approved identity data signal and the biometric identity data signal to create at least one subfile within the escrow database for each user comprising the approved identity data signal and the biometric data signal. The present invention further comprises a verification system for verifying the identity of said user after the user has enrolled in the enrollment system. The verification system has means for processing a second input biometric data signal input by the user to the biometric input device to match the user's preexisting biometric data in said escrow database according to a predetermined third set of criteria. The verification system has an output device for transmitting to a third party whether or not a match was located within said escrow database for said user. The present invention further relates to a method and system for providing a warranty against the theft of a user's identity.

Description

FIELD OF THE INVENTION [0001] This invention relates to a system and method for establishing an identity of a user and, more particularly, to a system and process for identifying a user to electronic systems such as processors, computers, and computer and electronic networks. BACKGROUND OF THE INVENTION [0002] Prior art methods of computer and internet security such as cryptographic processes, tokens, dongles, so-called “uncopyable media,” and various executable software protection schemes fail to prevent identity fraud. Such methods are incapable of ensuring that the person or entity at each end of a transaction is who he says he is. Because of the anonymous nature of the internet, the security of e-commerce-related information and transactions is a serious problem. At the center of the problem are those individuals who steal other persons' identities so as to perform fraud, pranks, vandalism, espionage and other illegitimate activities. Thus, the predominant internet security issu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/00
CPCG06F21/32G06Q20/4012G06Q20/40
Inventor ELLINGSON, JOHN F.
Owner ELLINGSON JOHN F
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products