Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Verification engine for user authentication










Image Number 4 for United States Patent #8032927.

Computer-implemented system and methods for authenticating the identity of a person, for example a customer (1) of an E-Commerce web site (15). The web site or other verification "client" (110) contacts a verification engine (10, 100) ("Authentex"), which may be implemented as a web server (604). The verification engine (10), in turn, has limited access to a plurality of independent, third-party secure databases (21, 112) which are maintained by Trusted Validators (3, 610, 620, etc), which are entities such as banks that have a pre-existing relationship with customer (FIG. 4), and due to that relationship, acquire and maintain "out-of-wallet" data (4) that may be useful to authenticate the identity of the customer. That confidential customer data--held by the third-party "Trusted Validators"--is not disclosed.








 
 
  Recently Added Patents
Remote ignition system for a vehicle and method for securing a remote ignition function
Tab visibility
Liquid crystal display
Arbitration circuit to arbitrate conflict between read/write command and scan command and display driver integrated circuit having the same
Stroboscopic image modulation to reduce the visual blur of an object being viewed by an observer experiencing vibration
Method of applying a spherical correction to map data for rendering direction-of-travel paths on a wireless communications device
Wristwatch
  Randomly Featured Patents
Method of making staircases and staircase made thereby
Recording medium, recording method, recording device, and reproduction method and reproducer
Petrophysical evaluation of subterranean formations
Timepiece with mobile decorations
Apparatus for feeding a printing plate to a printing machine
Oasomycins
Method for controlling power consumption associated with a processor
Guides and indicators for eye movement monitoring systems
Apparatus for accessing container security threats and method of use
Chip bump structure and method for forming the same