Patent application number | Description | Published |
20140233842 | CHARACTERISTIC VERIFICATION SYSTEM - Described is a characteristic verification system that includes security marks, devices, systems and methods that may be used to authenticate a material good and to provide strong brand protection. A device, such as a smartphone, that includes a software application, a camera and a light source, may be used to interrogate the security mark and connect to remote servers to authenticate the material good at varying levels of assurance. In addition to authenticating the good, the system may also authenticate the user and provide different information to different users and/or limit information that is provided unauthenticated users. | 08-21-2014 |
20140270334 | COVERT MARKING SYSTEM BASED ON MULTIPLE LATENT CHARACTERISTICS - Described are systems for combining multiple latent characteristics within a pigment such that with certain specialized knowledge and tools the specific pigment can be uniquely authenticated. The system takes advantage of the rapid proliferation of artificial light sources that are characterized by combinations of narrow band light sources that combine to simulate natural, or broadband light sources. With knowledge of the ambient lighting spectral emissions and the ability to illuminate the subject with an alternative light source with different spectral emissions, it is possible to determine the presence of the latent characteristics within the pigment. In some embodiments of the system, a smartphone including a CMOS or CCD sensor and a LED light source, could be combined with software to authenticate all of the latent characteristics. These characteristics can be combined with each other in different proportions to mass customize unique solutions for each customer or product line. | 09-18-2014 |
20150089635 | SYSTEM FOR CORRELATION OF INDEPENDENT AUTHENTICATION MECHANISMS - Described are devices, methods and non-transitory computer readable media for implementing an enhanced multi-factor authentication system. The system uses three user identifiers, and after a first user identifier is verified, the system receives a second user identifier from the user. As the second user identifier is being received, the system automatically detects a third user identifier and verifies simultaneously the second and third user identifiers. The second and third user identifiers are correlated with each other, and the correlation of these two identifiers (e.g., in addition to the identifiers themselves) is also verified. | 03-26-2015 |
Patent application number | Description | Published |
20130061285 | METHOD AND SYSTEM FOR PROVIDING BEHAVIORAL BI-DIRECTIONAL AUTHENTICATION - An approach for authenticating parties engaged in a web-based transaction without compromising the integrity or anonymity of the parties is described. An authentication platform receives, from a first application associated with a first party, an authentication request that has been redirected in response to a transaction initiated with a second application associated with a second party. The authentication platform forwards knowledge based assessment information to the first application that is based on determined behavioral information for authenticating the second party to the first party. A valid response to the knowledge based assessment information by the first application provides authentication of the first party to the second party. | 03-07-2013 |
20130152155 | PROVIDING USER ATTRIBUTES TO COMPLETE AN ONLINE TRANSACTION - A first server device receives a request for attributes, of a user, from a second server device associated with a receiving entity. The first server device determines whether the receiving entity is entitled to receive the attributes, and authenticates an identity of the user. The first server device also identifies the attributes based on the identity when the receiving entity is entitled to receive the attributes, and transmits the identified attributes to the second server device. | 06-13-2013 |
20130173335 | LIFESTYLE APPLICATION PLATFORM - A lifestyle application platform receives consumer information from a user device associated with a consumer, where the consumer information includes preference, demographic, identity, relationship, transactional, and location information associated with the consumer. The lifestyle application platform creates a consumer profile for the consumer based on the consumer information, and receives enterprise information from an enterprise device associated with an enterprise, where the enterprise information includes consumer interaction, transaction, and wish list information associated with the enterprise. The lifestyle application platform performs an analysis of the consumer information and the enterprise information, and provides, to the user device, notifications, reports, and offers, associated with the enterprise and relevant to the consumer, based on the analysis. | 07-04-2013 |
20130173336 | LIFESTYLE APPLICATION FOR CONSUMERS - A user device receives consumer information from a consumer, where the consumer information includes preference information, demographic information, identity information, relationship information, and location information associated with the consumer. The user device provides the consumer information to a lifestyle application platform, and receives, from the lifestyle application platform, a consumer profile for the consumer based on the consumer information. The user device receives, from the lifestyle application platform, notifications, reports, and offers, associated with an enterprise and relevant to the consumer, based on the consumer profile, and provides the notifications, reports, and offers for display to the consumer. | 07-04-2013 |
20130173337 | LIFESTYLE APPLICATION FOR ENTERPRISES - An enterprise device receives, from a lifestyle application platform, consumer profile information for a consumer associated with a user device, where the consumer profile information is relevant to an enterprise associated with the enterprise device. The enterprise device provides a portion of the consumer profile information to other enterprise devices associated with other enterprises, and receives additional consumer profile information from the other enterprise devices. The enterprise device creates enterprise information based on the consumer profile information and the additional consumer profile information, where the enterprise information is relevant to the consumer. The enterprise device provides the enterprise information to the lifestyle application platform, and the lifestyle application platform provides the enterprise information to the user device. | 07-04-2013 |
20130204708 | PROVIDING TARGETED OFFERS BASED ON DYNAMIC ATTRIBUTES OF USERS - A server device receives, from a third party device, a question about a behavior of a user. The server device identifies an attribute required to provide an answer to the question, determines whether a profile of the user includes the attribute, and determines the answer based on the attribute when the profile includes the attribute, where the answer does not include any information that identifies the user. The server device also transmits the answer to the third party. | 08-08-2013 |
20130291099 | NOTIFICATION SERVICES WITH ANOMALY DETECTION - A system is configure to monitor financial and/or identification inquiries for anomalous behavior; identify anomalous behavior by comparing the financial and/or identification inquiries to historical financial transactions and/or identification information; send a notification to a mobile device when anomalous behavior is identified for a user of the mobile device; and receive a signal from the mobile device approving, denying, or requesting more information about the anomalous behavior. | 10-31-2013 |
20140310764 | METHOD AND APPARATUS FOR PROVIDING USER AUTHENTICATION AND IDENTIFICATION BASED ON GESTURES - An approach is provided for authenticating and/or identifying a user through gestures. A plurality of media data sets of a user performing a sequence of gestures are captured. The media data sets are analyzed to determine the sequence of gestures. Authentication of the user is performed based on the sequence of gestures. | 10-16-2014 |
20140351909 | AUTHENTICATION RISK EVALUATION - A computer is configured to receive an authentication request that identifies one or more authentication form factors, and for each form factor identified, further identifies at least one parameter. The computer is further configured to generate a risk score for the authentication request using the parameter, the risk score being based at least in part on a complexity associated with each of the one or more authentication form factors. The computer is further configured to provide the risk score to a requester. | 11-27-2014 |