Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a communicating device via a communications network. One embodiment may include obtaining, at the communicating device, signals representative of one or more high-entropy tokens via the communications network, the one or more high-entropy tokens including one or more component tokens. The method may additionally include encrypting one or more parameters utilizing a first encryption key derived from at least one component token of the one or more component tokens and transmitting, via the communications network, one or more signals representative of the encrypted one or more parameters. The method may further include obtaining, at the communicating device, one or more signals indicating an outcome of a comparison between the one or more encrypted parameters with one or more similar parameters encrypted by an identity verifier.
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to authenticate a communications device. In an embodiment, the method may include accessing a prepackaged group of computer instructions and invoking an authentication operation of the communications device. The method may additionally include determining availability of a cellular communications channel to communicate with a client server and initiating a browser session to pass hardware-specific parameters to and from the client server. The method may further include receiving an outcome of the authentication operation, in which invoking of the authentication operation and receiving the outcome of the authentication operation occur during a single exchange between a client application and the prepackaged group of computer instructions.
The disclosed embodiments relate to a system that authenticates and/or identifies a user of an electronic device based on passive factors, which do not require conscious user actions. During operation of the system, in response to detecting a trigger event, the system collects sensor data from one or more sensors in the electronic device. Next, the system extracts a feature vector from the sensor data. The system then analyzes the feature vector to authenticate and/or identify the user, wherein the feature vector is analyzed using a model trained with sensor data previously obtained from the electronic device while the user was operating the electronic device.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for passwordless identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a communications device via a communications network. One embodiment may include obtaining, via a communications network coupled to a client computing resource, signals indicative of the subscriber identifier. The signals indicative of the subscriber identifier may facilitate computing a contactability metric of a communications device corresponding to the subscriber identifier, wherein the contactability metric is to relate to a likelihood that the communications device can be electronically contacted within a predetermined interval, the contactability metric being computed responsive to obtaining signals from one or more databases accessible to an authenticator, the obtained signals being indicative of an outcome of one or more events, such as determining a type of the communications device, as well as records pertaining to a number of additional signals indicating events that relate to activities of a communications device.
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to conduct an authentication process of a subscriber via a communications device utilizing a method comprising initiating transmission of a forward instruction from a cellular transceiver to the communications device, in which the communications device is co-located with the subscriber. The method may continue with waiting for a response to the forward instruction from the subscriber and transmitting, from an authenticator to a client computing resource, one or more first signals to indicate whether the authenticator has obtained the response to the forward instruction. The method also includes determining whether to complete the authentication process of the subscriber based, at least in part, on the one or more first signals indicating that an expected confirming response, an unexpected response, or an expected declining response has been received from the communications device.
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to conduct an authentication process of a subscriber via a communications device utilizing a method comprising initiating transmission of a forward instruction from a cellular transceiver to the communications device, in which the communications device is co-located with the subscriber. The method may continue with waiting for a response to the forward instruction from the subscriber and transmitting, from an authenticator to a client computing resource, one or more first signals to indicate whether the authenticator has obtained the response to the forward instruction. The method also includes determining whether to complete the authentication process of the subscriber based, at least in part, on the one or more first signals indicating that an expected confirming response, an unexpected response, or an expected declining response has been received from the communications device.
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a communications device via a communications network. One embodiment may include obtaining, via a communications network coupled to a client computing resource, signals indicative of the subscriber identifier. The signals indicative of the subscriber identifier may facilitate computing a contactability metric of a communications device corresponding to the subscriber identifier, wherein the contactability metric is to relate to a likelihood that the communications device can be electronically contacted within a predetermined interval, the contactability metric being computed responsive to obtaining signals from one or more databases accessible to an authenticator, the obtained signals being indicative of an outcome of one or more events, such as determining a type of the communications device, as well as records pertaining to a number of additional signals indicating events that relate to activities of a communications device.
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a communications device via a communications network. One embodiment may include obtaining, via a communications network coupled to a client computing resource, signals indicative of the subscriber identifier. The signals indicative of the subscriber identifier may facilitate computing a contactability metric of a communications device corresponding to the subscriber identifier, wherein the contactability metric is to relate to a likelihood that the communications device can be electronically contacted within a predetermined interval, the contactability metric being computed responsive to obtaining signals from one or more databases accessible to an authenticator, the obtained signals being indicative of an outcome of one or more events, such as determining a type of the communications device, as well as records pertaining to a number of additional signals indicating events that relate to activities of a communications device.
G06F 21/55 - Détection d’intrusion locale ou mise en œuvre de contre-mesures
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/38 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour la collecte d’informations de capteurs
G06F 21/56 - Détection ou gestion de programmes malveillants, p. ex. dispositions anti-virus
H04W 4/70 - Services pour la communication de machine à machine ou la communication de type machine
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to receive or obtain, responsive to transmitting the one or more search terms to a search entity, one or more primary content items that include messages that accord with the one or more search terms. The method may additionally include parsing the messages that accord with the one or more search terms to detect one or more relevant secondary search terms and obtaining secondary content items that accord with the one or more relevant secondary search terms. The method may further include generating signals to represent a report of entities that accord with the one or more relevant secondary search terms.
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to detect and/or prevent fraud that involves a communications device. The method may include transmitting, from a client computing resource to an authenticator, a subscriber identifier suspected of participating in a first fraudulent transaction. The method may further include obtaining, from the authenticator, one or more subscriber identifiers previously or subsequently assigned to the communications device by a communication services carrier.
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, using one or more computing devices to obtain, from a communications device, an identifier of the communications device transmitted via a communications network. The communications network may transmit a request for one or more parameters unique to a subscriber of the communications network. The method may also include processing signals indicative of the requested one or more parameters in response to the subscriber entering the one or more parameters into a graphical user interface of the communications device. The method may further include transmitting, to the communications device, one or more signals to provide a complement of subscriber parameters.
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to perform identity verification utilizing uploaded content and a trust score. One embodiment may include obtaining, via a communications network, an identifier of a communications device. The method may continue with transmitting, via the communications network, a message to request an upload of a captured image of first content and to request an upload of a captured image of second content. The method may continue with determining whether parameters extracted from the uploaded captured image of the first content match parameters extracted from the uploaded second content. The method may continue with generating an authentication signal for transmission to a client computing resource.
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
G06F 21/30 - Authentification, c.-à-d. détermination de l’identité ou de l’habilitation des responsables de la sécurité
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to perform identity verification utilizing uploaded content and a trust score. One embodiment may include obtaining, via a communications network, an identifier of a communications device. The method may continue with transmitting, via the communications network, a message to request an upload of a captured image of first content and to request an upload of a captured image of second content. The method may continue with determining whether parameters extracted from the uploaded captured image of the first content match parameters extracted from the uploaded second content. The method may continue with generating an authentication signal for transmission to a client computing resource.
G06F 21/36 - Authentification de l’utilisateur par représentation graphique ou iconique
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a communicating device via a communications network. One embodiment may include obtaining, at the communicating device, signals representative of one or more high-entropy tokens via the communications network, the one or more high-entropy tokens including one or more component tokens. The method may additionally include encrypting one or more parameters utilizing a first encryption key derived from at least one component token of the one or more component tokens and transmitting, via the communications network, one or more signals representative of the encrypted one or more parameters. The method may further include obtaining, at the communicating device, one or more signals indicating an outcome of a comparison between the one or more encrypted parameters with one or more similar parameters encrypted by an identity verifier.
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to form a secure channel, such as between or among a communications device, a client computing resource, and/or an identity verifier. In particular embodiments, a method may include recognizing via a subscriber identifier, a known communications device within a communications network. The method may additionally include issuing an eSIM to the communications device via the communications network in response to recognizing the communications device and relating the eSIM to the subscriber identifier of the communications device. The method may further include, responsive to receipt of one or more signals from a client computing resource, utilizing encryption provided by the eSIM to form a secure channel between or among the communications device and an identity verifier.
H04W 12/03 - Protection de la confidentialité, p. ex. par chiffrement
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
H04W 12/0431 - Distribution ou pré-distribution de clésMise en accord de clés
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to form a secure channel, such as between or among a communications device, a client computing resource, and/or an identity verifier. In particular embodiments, a method may include recognizing via a subscriber identifier, a known communications device within a communications network. The method may additionally include issuing an eSIM to the communications device via the communications network in response to recognizing the communications device and relating the eSIM to the subscriber identifier of the communications device. The method may further include, responsive to receipt of one or more signals from a client computing resource, utilizing encryption provided by the eSIM to form a secure channel between or among the communications device and an identity verifier.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Business management, risk management and business administration services all pertaining to identity verification and authentication; Business consultancy services pertaining to identity verification and authentication; Business data analysis in the field of identity verification and authentication; none of the aforesaid services related to music, media and entertainment business; none of the aforesaid services for use in connection with physical location and geolocation services, including for personal safety and security. Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity; none of the aforesaid services related to music, media and entertainment business; none of the aforesaid services for use in connection with physical location and geolocation services, including for personal safety and security.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
21.
Single-exchange authentication of a communications device
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to authenticate a communications device. In an embodiment, the method may include accessing a prepackaged group of computer instructions and invoking an authentication operation of the communications device. The method may additionally include determining availability of a cellular communications channel to communicate with a client server and initiating a browser session to pass hardware-specific parameters to and from the client server. The method may further include receiving an outcome of the authentication operation, in which invoking of the authentication operation and receiving the outcome of the authentication operation occur during a single exchange between a client application and the prepackaged group of computer instructions.
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to authenticate a communications device. In an embodiment, the method may include accessing a prepackaged group of computer instructions and invoking an authentication operation of the communications device. The method may additionally include determining availability of a cellular communications channel to communicate with a client server and initiating a browser session to pass hardware-specific parameters to and from the client server. The method may further include receiving an outcome of the authentication operation, in which invoking of the authentication operation and receiving the outcome of the authentication operation occur during a single exchange between a client application and the prepackaged group of computer instructions.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers. Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity.
24.
SUBSCRIBER AUTHENTICATION RESPONSIVE TO EMERGENCY SERVICES REGISTRATION
Methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a subscriber of a communications device. The method may include receiving, via a server coupled to a network, a first signal that indicates a modification of one or more location descriptors corresponding to a communications device. The modification may occur in connection with receipt of the one or more location descriptors by an emergency services provider. The method may include storing a record of the modification of the one or more location descriptors in response to creation of one or more new location descriptors corresponding to a subscriber identifier, modification of one or more previously existing location descriptors corresponding to the subscriber identifier, or deletion of the subscriber identifier. The method may additionally include generating a second signal to form or update an electronic or digital identity of the communications device responsive to receiving the first signal.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers (1) Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
26.
COMMUNICATIONS DEVICE AND/OR AUTHENTICATION SERVER USING SUBSCRIBER BIOMETRIC ATTRIBUTES
Briefly, methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a subscriber of a communications device. The method may include receiving, such as at an authenticating server via a client server, an indication that a subscriber is attempting to access secure content via the communications device. The method may continue with transmitting one or more anonymizing parameters from the authentication server to the communications device. The method may continue with receiving, by the authentication server, in response to transmitting the one or more anonymizing parameters to the communications device, first one or more anonymized values computed using the one or more anonymizing parameters and one or more biometric attributes of the subscriber. The method may continue with authenticating the subscriber based, at least in part, on comparing the received one or more anonymized values with the one or more anonymized values computed at the authentication server.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Briefly, methods, apparatuses, and/or articles of manufacture may be implemented to authenticate a subscriber of a communications device. The method may include receiving, such as at an authenticating server via a client server, an indication that a subscriber is attempting to access secure content via the communications device. The method may continue with transmitting one or more anonymizing parameters from the authentication server to the communications device. The method may continue with receiving, by the authentication server, in response to transmitting the one or more anonymizing parameters to the communications device, first one or more anonymized values computed using the one or more anonymizing parameters and one or more biometric attributes of the subscriber. The method may continue with authenticating the subscriber based, at least in part, on comparing the received one or more anonymized values with the one or more anonymized values computed at the authentication server.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
28.
PROVING POSSESSION OF A COMMUNICATIONS DEVICE VIA A DIRECTED CONNECTION
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to prove possession of a communications device, such as a mobile communications device. In a particular method, proving possession of a communications device may include receiving, from a client server, an indicator to indicate a communication services carrier servicing the communications device. The method may continue with generating a session identifier and a resource locator to direct the communications device to establish communications with an identity verifier at an address corresponding to the resource locator. The resource locator may be determined based, at least in part, on the indicator received from the client server. The method may additionally include the communications device transmitting one or more identifiers, determined, at least in part, from content stored within, or data derived from, memory of the communications device.
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, to prove possession of a communications device, such as a mobile communications device. In a particular method, proving possession of a communications device may include receiving, from a client server, an indicator to indicate a communication services carrier servicing the communications device. The method may continue with generating a session identifier and a resource locator to direct the communications device to establish communications with an identity verifier at an address corresponding to the resource locator. The resource locator may be determined based, at least in part, on the indicator received from the client server. The method may additionally include the communications device transmitting one or more identifiers, determined, at least in part, from content stored within, or data derived from, memory of the communications device.
Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more computing devices to facilitate and/or support one or more operations and/or techniques for an identity verification platform, such as implemented, at least in part, via one or more electronic communication networks.
Briefly, in accordance with one embodiment, a method and/or system for mobile identity authentication is disclosed. For example, mobile identity authentication may be employed in a variety of situations, including purchases, financial transactions, granted access to accounts, granting access to content, etc.
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, using one or more computing devices to obtain, from a communications device, an identifier of the communications device transmitted via a communications network. The communications network may transmit a request for one or more parameters unique to a subscriber of the communications network. The method may also include processing signals indicative of the requested one or more parameters in response to the subscriber entering the one or more parameters into a graphical user interface of the communications device. The method may further include transmitting, to the communications device, one or more signals to provide a complement of subscriber parameters.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 20/16 - Paiements effectués par le biais de systèmes de télécommunication
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
33.
TRANSMITTING A COMPLEMENT OF USER PARAMETERS TO A COMMUNICATIONS DEVICE
Briefly, example methods, apparatuses, and/or articles of manufacture may be implemented, in whole or in part, using one or more computing devices to obtain, from a communications device, an identifier of the communications device transmitted via a communications network. The communications network may transmit a request for one or more parameters unique to a subscriber of the communications network. The method may also include processing signals indicative of the requested one or more parameters in response to the subscriber entering the one or more parameters into a graphical user interface of the communications device. The method may further include transmitting, to the communications device, one or more signals to provide a complement of subscriber parameters.
Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented to represent an identity network corresponding to a communications device subscriber in an electronic or digital domain. The method may include transmitting a message to a communications device. Responsive to the transmitted message, an authenticator may receive a signal to verify that a subscriber having a real-world identity is co-located with the communications device. The method may continue with establishing, in an electronic or digital domain, two or more nodes of an identity network corresponding to aspects of the real-world identity of the subscriber, the identity network being attached to the real-world identity via a persistent identifier, and the two or more nodes of the identity network being linked via one or more relationships.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Business management, risk management and business administration services all pertaining to identity verification and authentication; Business consultancy services pertaining to identity verification and authentication; Business data analysis in the field of identity verification and authentication; none of the aforesaid services for use in connection with physical location and geolocation services, including for personal safety and security Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity; none of the aforesaid services for use in connection with physical location and geolocation services, including for personal safety and security
36.
Identity network representation of communications device subscriber in a digital domain
Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented to represent an identity network corresponding to a communications device subscriber in an electronic or digital domain. The method may include transmitting a message to a communications device. Responsive to the transmitted message, an authenticator may receive a signal to verify that a subscriber having a real-world identity is co-located with the communications device. The method may continue with establishing, in an electronic or digital domain, two or more nodes of an identity network corresponding to aspects of the real-world identity of the subscriber, the identity network being attached to the real-world identity via a persistent identifier, and the two or more nodes of the identity network being linked via one or more relationships.
Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be utilized to bring about accessing a data store to determine that signal packets have been received, via an electronic communications network, from a communications device that is to be verified. The communications device being co-located with a real-world identity. The method may additionally include electronically determining that a subscriber account identifier or a subscriber-unique alias is bound to an account held by the real-world identity and electronically tying the subscriber account identifier or the subscriber-unique alias to the real-world identity in response to electronically verifying the communications device after determining that the signal packets have been received from the communications device and in response to electronically determining that the subscriber account identifier or the subscriber-unique alias is bound to the account held by the real-world identity.
Provided is a method for operating an authentication server for authenticating a user who is communicating with an enterprise via a network. The method include receiving, via the network, a first authenticator including first information from a low energy wireless device received via a user device wirelessly, and storing the first authenticator. When the authentication service later receives, from the enterprise, a request to authenticate the user, the authentication server transmits an authentication request to the user device via the network requesting that the user read information from the low energy wireless device using the user device. The information received from the low energy wireless device in response to the authentication request is then used authenticate the user by comparing the information received from the low energy wireless device due to the authentication request with the stored first authenticator.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 12/02 - Protection de la confidentialité ou de l'anonymat, p. ex. protection des informations personnellement identifiables [PII]
H04W 12/033 - Protection de la confidentialité, p. ex. par chiffrement du plan utilisateur, p. ex. trafic utilisateur
H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]
39.
Authentication of transactions conducted using mobile devices
A transaction authentication system authenticates a transaction by determining whether a mobile device and POS device involved in the transaction are at the same location. A POS registry stores location data for POS devices. A PAN registry stores mobile device IDs corresponding to account numbers. A mobile device ID can be provided from the PAN registry in response to receiving an account number from a POS device. The mobile device ID can then be used to retrieve location information from a home location register maintained by a mobile service provider. The retrieved location data for a POS device and the retrieved location data for a mobile device are compared.
G06Q 20/20 - Systèmes de réseaux présents sur les points de vente
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04W 4/02 - Services utilisant des informations de localisation
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
42.
Subscriber account identifier transfer in a telecommunications system
Example methods, apparatuses, and/or articles of manufacture may be implemented to utilize a computing device to receive, from a communications network, a first signal to indicate that a subscriber, such as a subscriber of a mobile communication services carrier, has initiated an electronic transaction. The method may include detecting, utilizing one or more data stores, a record of a transfer of a subscriber account identifier and, in response, determining whether the transfer corresponds to a porting event initiated by a subscriber or initiated by a communication services carrier. The method may further include transmitting at least a second signal on the communications network, in which the at least the second signal indicates authentication, authorization, and/or verification of the electronic or digital transaction responsive to determining whether the transfer corresponds to a porting event initiated by a subscriber or corresponds to an event initiated by a communication services carrier.
A communications management system for implementing a freeze on electronic transactions. For example, a device management system provides a means of preventing the porting of at least one communication device account—such as a cellular phone number—from one carrier to another through a list of identifiers that include phone numbers, device identifiers, or personal identifiers that have been enrolled in the device management system through an interface by an authorized user. Advantageously, the device management system provides a revision to the existing phone porting architecture and enables fraud detection and prevention.
H04W 4/14 - Services d'envoi de messages courts, p. ex. SMS ou données peu structurées de services supplémentaires [USSD]
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more computing devices to receive at a server device coupled to a communications network, a first signal indicating that a subscriber of a mobile device has initiated a transaction. The method may continue with accessing a data store to determine occurrence of one or more deterministic events with respect to the mobile device and accessing the data store to determine one or more behavior norms specific to the subscriber with respect to the mobile device. The method may additionally include generating, by the server coupled to the communications network, a second signal indicating an authorization status of the transaction, the authorization status being dependent on the occurrence of the one or more deterministic events in relation to the one or more behavior norms.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
Provided is a method for authenticating a user communicating with an enterprise via a network. The method includes receiving, via the network, authenticators for a user from a first user device associated with the user, and storing the received authenticators. A first authenticator from the stored authenticators is selected to be used for authenticating the user based on an authentication policy received from the enterprise. An authentication request is transmitted to a user device requesting the first authenticator and the user is authentication by comparing the received authenticator with the stored first authenticator.
The disclosed embodiments relate to a system that authenticates and/or identifies a user of an electronic device based on passive factors, which do not require conscious user actions. During operation of the system, in response to detecting a trigger event, the system collects sensor data from one or more sensors in the electronic device. Next, the system extracts a feature vector from the sensor data. The system then analyzes the feature vector to authenticate and/or identify the user, wherein the feature vector is analyzed using a model trained with sensor data previously obtained from the electronic device while the user was operating the electronic device.
The disclosed embodiments relate to a system that authenticates and/or identifies a user of an electronic device based on passive factors, which do not require conscious user actions. During operation of the system, in response to detecting a trigger event, the system collects sensor data from one or more sensors in the electronic device. Next, the system extracts a feature vector from the sensor data. The system then analyzes the feature vector to authenticate and/or identify the user, wherein the feature vector is analyzed using a model trained with sensor data previously obtained from the electronic device while the user was operating the electronic device.
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers. Business management, risk management and business administration services all pertaining to identity verification and authentication; Business consultancy services pertaining to identity verification and authentication; Business data analysis in the field of identity verification and authentication. Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity.
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers (1) Business management, risk management and business administration services all pertaining to identity verification and authentication; Business consultancy services pertaining to identity verification and authentication; Business data analysis in the field of identity verification and authentication
(2) Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Software (SDKs) for identifying individuals for the purposes of detecting on line fraud and on line suspicious activity. Software as a service (SAAS) featuring software for authenticating individuals and devices.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Software (SDKs) for identifying individuals for the purposes of detecting on line fraud and on line suspicious activity. (1) Software as a service (SAAS) featuring software for authenticating individuals and devices.
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers. Business management, risk management and business administration services all pertaining to identity verification and authentication; Business consultancy services pertaining to identity verification and authentication; Business data analysis in the field of identity verification and authentication. Providing educational services in the nature of classes and instruction, online instruction and courses, and workshops and training services related to mobile identity verification, authentication, information security, data security; Providing a website with blogs, non-downloadable articles, non-downloadable videos and podcasts in the fields of mobile identity, authentication, customer identification, customer information tracking and data security. Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity.
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers. (1) Business management, risk management and business administration services all pertaining to identity verification and authentication; Business consultancy services pertaining to identity verification and authentication; Business data analysis in the field of identity verification and authentication.
(2) Providing educational services in the nature of classes and instruction, online instruction and courses, and workshops and training services related to mobile identity verification, authentication, information security, data security; Providing blogs, non-downloadable articles, non-downloadable videos and podcasts through a website in the fields of mobile identity, authentication, customer identification, customer information tracking and data security
(3) Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for verification and authentication of identity; downloadable software for registering tokenized identities; downloadable software for managing digital identities; downloadable software for secure transactions across multiple digital servicing use cases including login, high-risk transactions, call center and passwordless login Non-downloadable software for verification and authentication of identity; non-downloadable software for registering tokenized identities; non-downloadable software for managing digital identities; non-downloadable software for secure transactions across multiple digital servicing use cases including login, high-risk transactions, call center and passwordless login
56.
User authentication based on device identifier further identifying software agent
Provided is a method for authenticating a user communicating with an enterprise via a network. The method includes receiving, via the network, authenticators for a user from a first user device associated with the user, and storing the received authenticators. A first authenticator from the stored authenticators is selected to be used for authenticating the user based on an authentication policy received from the enterprise. An authentication request is transmitted to a user device requesting the first authenticator and the user is authentication by comparing the received authenticator with the stored first authenticator.
The disclosed embodiments provide a system that identifies a user of an electronic device. During a training mode, the system uses an initial training data set, comprising sensor data from electronic devices associated with a set of initial users, to train a multilayer neural network model to authenticate the initial users. Next, the system uses an additional training data set, which includes sensor data from electronic devices associated with one or more new users, to update a portion of the weights in the trained model so that the updated model can be used to authenticate both the initial users and the one or more new users. During a subsequent mode, the system uses the updated model to authenticate a user of the electronic device based on sensor data contemporaneously received from the electronic device.
A system and method allows users to make purchases by charging or funding a prepaid debit card with their cell phone accounts by simulating a user roaming with their mobile device.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/16 - Paiements effectués par le biais de systèmes de télécommunication
G06Q 20/26 - Schémas de débit, c.-à-d. de "paiement immédiat"
G06Q 20/28 - Schémas de prépaiement, c.-à-d. de "paiement préalable"
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
H04M 15/00 - Dispositions de comptage, de contrôle de durée ou d'indication de durée
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers Business management, risk management and business administration services all pertaining to identity verification and authentication; Business consultancy services pertaining to identity verification and authentication; Business data analysis in the field of identity verification and authentication Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers Business management, risk management and business administration services all pertaining to identity verification and authentication; Business consultancy services pertaining to identity verification and authentication; Business data analysis in the field of identity verification and authentication Providing educational services in the nature of classes and instruction, online instruction and courses, and workshops and training services related to mobile identity verification, authentication, information security, data security; Providing a website featuring blogs, non-downloadable articles, non-downloadable videos and podcasts in the fields of mobile identity, authentication, customer identification, customer information tracking and data security Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software kits (SDKs) for developing software that identifies individuals for purposes of detecting online fraud and online suspicious activity Software as a service (SAAS) featuring software for authenticating individuals and electronic devices for the purpose of preventing online fraud or online suspicious activity
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity, for verifying identity through telephone landlines, for verifying identity through voice OTP, for verifying identity through SMS, for managing digital identities, and for tracking and managing customer data; Downloadable software for providing user related information and analytics to customers. (1) Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity, for verifying identity through telephone landlines, for verifying identity through voice OTP, for verifying identity through SMS, for managing digital identities, and for tracking and managing customer data; Providing online, non-downloadable software for providing user identity related information and analytics to customers; Providing online, non-downloadable software for enabling users to utilize device identification information for evaluating transactions to prevent fraud and enabling e-commerce for new account origination, web payments, account login, and profiling transactions; Providing online, non-downloadable software for use in the detection and prevention of online fraud and abuse, for device and account authentication, and computer, network, and online security and fraud management; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, voice OTP, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users and voice OTP; Computer services, namely, providing verification services using technology to authenticate mobile device user identity.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; downloadable software for verifying mobile user identity, for verifying identity through telephone landlines, for verifying identity through voice otp, for verifying identity through sms, for managing digital identities, and for tracking and managing customer data; downloadable software for providing user related information and analytics to customers. Providing online, non-downloadable software for identity verification and authentication; providing online, non-downloadable software for verifying mobile user identity, for verifying identity through telephone landlines, for verifying identity through voice otp, for verifying identity through sms, for managing digital identities, and for tracking and managing customer data; providing online, non-downloadable software for providing user identity related information and analytics to customers; providing online, non-downloadable software for enabling users to utilize device identification information for evaluating transactions to prevent fraud and enabling e-commerce for new account origination, web payments, account login, and profiling transactions; providing online, non-downloadable software for use in the detection and prevention of online fraud and abuse, for device and account authentication, and computer, network, and online security and fraud management; providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless internet, voice otp, wireless networks and cable networks; providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; platform as a service (paas) featuring computer software platforms for use in verifying and authenticating mobile device users and voice otp; computer services, namely, providing verification services using technology to authenticate mobile device user identity.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; downloadable software for verifying mobile user identity, managing digital identities, tracking and managing customer data; downloadable software for account takeover protection. Providing online, non-downloadable software for identity verification and authentication; providing online, non-downloadable software for verifying mobile user identity, managing digital identities, and tracking and managing customer data; providing online, non-downloadable software for account takeover protection; providing online, non-downloadable software for enabling users to utilize device identification information for evaluating transactions to prevent fraud and enabling e-commerce for new account origination, web payments, account login, and profiling transactions; providing online, non-downloadable software for use in the detection and prevention of online fraud and abuse, for device and account authentication, and computer, network, and online security and fraud management; providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless internet, wireless networks and cable networks; providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; platform as a service (paas) featuring computer software platforms for use in verifying and authenticating mobile device users; computer services, namely, providing verification services using technology to authenticate mobile device user identity.
65.
Authenticator centralization and protection based on authenticator type and authentication policy
Provided is a method for authenticating a user communicating with an enterprise via a network. The method includes receiving, via the network, authenticators for a user from a first user device associated with the user, and storing the received authenticators. A first authenticator from the stored authenticators is selected to be used for authenticating the user based on an authentication policy received from the enterprise. An authentication request is transmitted to a user device requesting the first authenticator and the user is authentication by comparing the received authenticator with the stored first authenticator.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for authenticating individuals and devices Software as a service (SAAS) featuring software for authenticating individuals and devices
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity, managing digital identities, tracking and managing customer data; Downloadable software for providing user related information and analytics to customers (1) Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity, managing digital identities, and tracking and managing customer data; Providing online, non-downloadable software for providing user identity related information and analytics to customers; Providing online, non-downloadable software for enabling users to utilize device identification information for evaluating transactions to prevent fraud and enabling e-commerce for new account origination, web payments, account login, and profiling transactions; Providing online, non-downloadable software for use in the detection and prevention of online fraud and abuse, for device and account authentication, and computer, network, and online security and fraud management; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity, managing digital identities, tracking and managing customer data; Downloadable software for providing user related information and analytics to customers. Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity, managing digital identities, and tracking and managing customer data; Providing online, non-downloadable software for providing user identity related information and analytics to customers; Providing online, non-downloadable software for enabling users to utilize device identification information for evaluating transactions to prevent fraud and enabling e-commerce for new account origination, web payments, account login, and profiling transactions; Providing online, non-downloadable software for use in the detection and prevention of online fraud and abuse, for device and account authentication, and computer, network, and online security and fraud management; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity.
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers (1) Business management, risk management and business administration services all pertaining to identity verification and authentication; Business consultancy services pertaining to identity verification and authentication; Business data analysis in the field of identity verification and authentication
(2) Providing educational services in the nature of classes and instruction, online instruction and courses, and workshops and training services related to mobile identity verification, authentication, information security, data security; Providing blogs, non-downloadable articles, non-downloadable videos and podcasts through a website in the fields of mobile identity, authentication, customer identification, customer information tracking and data security.
(3) Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers. Business management, risk management and business administration services all pertaining to identity verification and authentication; Business consultancy services pertaining to identity verification and authentication; Business data analysis in the field of identity verification and authentication. Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity; Providing of information in relation to mobile identity, authentication, customer identification, customer information tracking and data security via blogs, non-downloadable articles, non-downloadable videos and podcasts, including the aforesaid provided via a website.
Business management, business risk management and business administration services all pertaining to identity verification and authentication; Business consultancy services pertaining to identity verification and authentication; Business data analysis in the field of identity verification and authentication
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
41 - Éducation, divertissements, activités sportives et culturelles
Produits et services
Providing educational services in the nature of classes and instruction, online instruction and courses, and workshops and training services related to mobile identity verification, authentication, information security, data security; Providing a website featuring blogs, non-downloadable articles, non-downloadable videos and podcasts in the fields of mobile identity, authentication, customer identification, customer information tracking and data security
09 - Appareils et instruments scientifiques et électriques
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers
78.
Systems and methods for porting communication devices
A communications management system for implementing a freeze on electronic transactions. For example, a device management system provides a means of preventing the porting of at least one communication device account—such as a cellular phone number—from one carrier to another through a list of identifiers that include phone numbers, device identifiers, or personal identifiers that have been enrolled in the device management system through an interface by an authorized user. Advantageously, the device management system provides a revision to the existing phone porting architecture and enables fraud detection and prevention.
H04W 4/14 - Services d'envoi de messages courts, p. ex. SMS ou données peu structurées de services supplémentaires [USSD]
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
09 - Appareils et instruments scientifiques et électriques
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity and managing digital identities; Downloadable software for providing mobile user identity information and analytics to customers
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity and managing digital identities; Providing online, non-downloadable software for providing user identity information and analytics to customers; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
Business management, risk management and business administration services all pertaining to identity verification and authentication; business consultancy services pertaining to identity verification and authentication; business data analysis in the field of identity verification and authentication
41 - Éducation, divertissements, activités sportives et culturelles
Produits et services
Providing educational services in the nature of classes and instruction, online instruction and courses, and workshops and training services related to mobile identity verification, authentication, information security, data security; Providing a website featuring blogs, non-downloadable articles, non-downloadable videos and podcasts in the fields of mobile identity, authentication, customer identification, customer information tracking and data security
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity, for verifying identity through telephone landlines, for verifying identity through voice OTP, for verifying identity through SMS, for managing digital identities, and for tracking and managing customer data; Downloadable software for providing user related information and analytics to customers Providing online non-downloadable software for identity verification and authentication; Providing online non-downloadable software for verifying mobile user identity, for verifying identity through telephone landlines, for verifying identity through voice OTP, for verifying identity through SMS, for managing digital identities, and for tracking and managing customer data; Providing online non-downloadable software for providing user identity related information and analytics to customers; Providing online non-downloadable software for enabling users to utilize device identification information for evaluating transactions to prevent fraud and enabling e-commerce for new account origination, web payments, account login, and profiling transactions; Providing online non-downloadable software for use in the detection and prevention of online fraud and abuse, for device and account authentication, and computer, network, and online security and fraud management; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, voice OTP, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users and voice OTP; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity, managing digital identities, tracking and managing customer data; Downloadable software for providing user related information and analytics to customers Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity, managing digital identities, and tracking and managing customer data; Providing online, non-downloadable software for providing user identity related information and analytics to customers; Providing online, non-downloadable software for enabling users to utilize device identification information for evaluating transactions to prevent fraud and enabling e-commerce for new account origination, web payments, account login, and profiling transactions; Providing online, non-downloadable software for use in the detection and prevention of online fraud and abuse, for device and account authentication, and computer, network, and online security and fraud management; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users; Computer services, namely, providing verification services using technology to authenticate mobile device user identity
Briefly, in accordance with one embodiment, a method and/or system for mobile identity authentication is disclosed. For example, mobile identity authentication may be employed in a variety of situations, including purchases, financial transactions, granted access to accounts, granting access to content, etc.
The present innovation extends the innovations inherent in our prior work on security and privacy enhanced geolocation to address specific problems of determining the proximity of two Internet connected devices. This could be used for applications such as determining proximity of a user's smartphone to an ATM machine they are using. Or to determine the physical proximity of a shopper and a cashier at a check out line. A straightforward application of the prior work will not suffice, as devices may have very different types of connectivity to the Internet. We solve this problem by placing reciprocal slave servers on each of the devices and giving high weight to the time taken for messages to travel from each device to the slave on the other device. The system can be extended to more than two entities by performing the calculation in a pairwise fashion and using further optimizations.
The security of a transaction conducted at a mobile device, using a one-time password to authenticate the mobile device user, is enhanced by requiring that the mobile device also be authenticated by providing a valid mobile device ID. A security server that provides the one-time password to the mobile device also provides a hyperlink that, when selected, causes a mobile device ID, such as an IMSI, to be retrieved from a SIM in the mobile device The retrieved mobile device ID is then sent to the security server. A database associated with the security server stores valid mobile device IDs, and compares the retrieved mobile device ID from the mobile device to the valid mobile device ID for that mobile device stored in the database. In alternative embodiments, the mobile device is authenticated without the use of a one-time password. In some cases the mobile device ID may be a phone number returned in an HTTP message header from the mobile device, and it is compared to a mobile device ID maintained by a bank or other entity managing the transaction.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
88.
System and method for authentication of a registered mobile subscriber
Briefly, in accordance with one or more embodiments, for example, a method and/or system is provided to at least authenticate a mobile subscriber that has been registered via a registration process comprising. A current international mobile subscriber identifier (IMSI) associated with a mobile telephone number received electronically via a network is queried. A database entry created via the registration process including an IMSI associated with a received mobile telephone number at the time of mobile subscriber registration is also queried. At least the current IMSI and the IMSI of the database entry are compared. Account status of the mobile subscriber based at least in part on a match between the current IMSI and the IMSI of the database entry is verified. Verifying the account status includes determining creditworthiness with respect to the account of the mobile subscriber.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/16 - Paiements effectués par le biais de systèmes de télécommunication
G06Q 20/26 - Schémas de débit, c.-à-d. de "paiement immédiat"
G06Q 20/28 - Schémas de prépaiement, c.-à-d. de "paiement préalable"
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
H04M 15/00 - Dispositions de comptage, de contrôle de durée ou d'indication de durée
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
89.
Anonymous authentication and remote wireless token access
Provided is a method for operating an authentication server for authenticating a user who is communicating with an enterprise via a network. The method includes receiving, via the network, a first authenticator including first information from a low energy wireless device received via a user device wirelessly, and storing the first authenticator. When the authentication service later receives, from the enterprise, a request to authenticate the user, the authentication server transmits an authentication request to the user device via the network requesting that the user read information from the low energy wireless device using the user device. The information received from the low energy wireless device in response to the authentication request is then used to authenticate the user by comparing the information received from the low energy wireless device due to the authentication request with the stored first authenticator.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
H04W 12/033 - Protection de la confidentialité, p. ex. par chiffrement du plan utilisateur, p. ex. trafic utilisateur
H04W 12/02 - Protection de la confidentialité ou de l'anonymat, p. ex. protection des informations personnellement identifiables [PII]
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/38 - Protocoles de paiementArchitectures, schémas ou protocoles de paiement leurs détails
G06Q 40/02 - Opérations bancaires, p. ex. calcul d'intérêts ou tenue de compte
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 12/04 - Gestion des clés, p. ex. par architecture d’amorçage générique [GBA]
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
36 - Services financiers, assurances et affaires immobilières
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity, managing digital identities, tracking and managing customer data; Downloadable software for instant customer acquisition with verified pre-filled customer information, passwordless login, and account takeover protection; Downloadable software for providing user identity trust scores and related information and analytics to customers. Business management and business administration services; Administration of consumer identify, tokenized IDs, mobile device user information, mobile device change events, and other user personal data; Business consultancy services; Business data analysis. Financial services, namely, providing, processing, verifying and authenticating mobile device users for transaction authorization and verification. Providing education and training services related to mobile identity verification, authentication, information security, data security. Non-downloadable software for identity verification and authentication services; Non-downloadable software for verifying mobile user identity, managing digital identities, and tracking and managing customer data; Non-downloadable software for instant customer acquisition with verified pre-filled customer information, passwordless login, and account takeover protection; Non-downloadable software for providing user identity trust scores and related information and analytics to customers; Consulting services pertaining to identity verification and authentication services; Providing mobile identity verification and authentication services of subscribers across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; authentication services in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; providing information via a website through blogs, articles, videos and podcasts in the fields of mobile identity, authentication, customer identification, customer information tracking and data security.
91.
Authenticator centralization and protection based on authenticator type and authentication policy
Provided is a method for authenticating a user communicating with an enterprise via a network. The method includes receiving, via the network, authenticators for a user from a first user device associated with the user, and storing the received authenticators. A first authenticator from the stored authenticators is selected to be used for authenticating the user based on an authentication policy received from the enterprise. An authentication request is transmitted to a user device requesting the first authenticator and the user is authentication by comparing the received authenticator with the stored first authenticator.
A transaction authentication system authenticates a transaction by determining whether a mobile device and POS device involved in the transaction are at the same location. A POS registry stores location data for POS devices. A PAN registry stores mobile device IDs corresponding to account numbers. A mobile device ID can be provided from the PAN registry in response to receiving an account number from a POS device. The mobile device ID can then be used to retrieve location information from a home location register maintained by a mobile service provider. The retrieved location data for a POS device and the retrieved location data for a mobile device are compared.
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 4/029 - Services de gestion ou de suivi basés sur la localisation
H04W 4/02 - Services utilisant des informations de localisation
H04W 12/63 - Sécurité dépendant du contexte dépendant de la localisationSécurité dépendant du contexte dépendant de la proximité
93.
Implicit authentication for unattended devices that need to identify and authenticate users
The disclosed embodiments provide a system that authenticates a user of an unattended device. In response to sensing a presence of the user in proximity to the unattended device, the system makes a call from the unattended device to an authentication service to authenticate the user. In response to the call, the authentication service authenticates the user based on recently collected sensor data, which was obtained from one or more sensors in a portable electronic device belonging to the user. If authentication succeeds, the system allows the user to proceed with an interaction with the unattended device.
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
G06F 21/35 - Authentification de l’utilisateur impliquant l’utilisation de dispositifs externes supplémentaires, p. ex. clés électroniques ou cartes à puce intelligentes communiquant sans fils
A mobile phone number that is been provided by a customer during enrollment is verified for use. SS7 protocol data associated with the mobile phone number is collected and evaluated, and if the condition of the subscriber account associated with the phone number has changed or is inconsistent with the circumstances surrounding the enrollment of the phone number, the phone number is designated as one that is not to be called.
H04M 3/38 - Dispositions de service gradué, c.-à-d. interdiction à quelques abonnés d'établir certaines connexions
H04M 7/12 - Dispositions d'interconnexion entre centres de commutation pour l'exploitation entre centraux comportant différents types d'équipement de commutation, p. ex. à entraînement mécanique et pas à pas ou décimal et non décimal
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04M 1/677 - Dispositions pour empêcher la composition ou l'émission de numéros prédéterminés de téléphone ou de types sélectionnés de numéros de téléphone, p. ex. numéros à longue distance
09 - Appareils et instruments scientifiques et électriques
35 - Publicité; Affaires commerciales
36 - Services financiers, assurances et affaires immobilières
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for identity verification and authentication services; Downloadable software for verifying mobile user identity, managing digital identities, tracking and managing customer data; Downloadable software for instant customer acquisition with verified pre-filled customer information, passwordless login, and account takeover protection; Downloadable software for providing user identity trust scores and related information and analytics to customers Business management, risk management and business administration services; Business consultancy services; Business data analysis Financial Services, in the nature of providing financial transaction services, namely, providing secure commercial transactions and payment options using a mobile device at a point of sale Providing educational services in the nature of classes and instruction, online instruction and courses, and workshops and training services related to mobile identity verification, authentication, information security, data security; Providing a website featuring blogs, non-downloadable articles, non-downloadable videos and podcasts in the fields of mobile identity, authentication, customer identification, customer information tracking and data security Providing online, non-downloadable software for identity verification and authentication; Providing online, non-downloadable software for verifying mobile user identity, managing digital identities, and tracking and managing customer data; Providing online, non-downloadable software for use in facilitating instant customer acquisition with verified pre-filled customer information, password less login, and account takeover protection; Providing online, non-downloadable software for providing user identity trust scores and related information and analytics to customers; Providing online, non-downloadable software for enabling users to utilize device identification information for evaluating transactions to prevent fraud and enabling e-commerce for new account origination, web payments, account login, and profiling transactions; Providing online, non-downloadable software for use in the detection and prevention of online fraud and abuse, for device and account authentication, and computer, network, and online security and fraud management; Providing electronic verification services using technology to authenticate user identity across multiple mobile devices and via mobile operator networks, wireless Internet, wireless networks and cable networks; Providing electronic verification services using technology to authenticate user identity in association with any transaction to assert identity of a user of a mobile device, a user of a personal computer, or a person calling into a call center; Platform as a service (PAAS) featuring computer software platforms for use in verifying and authenticating mobile device users to facilitate secure payment transaction processing services; Platform as a service (PAAS) featuring computer software platforms for use in data compilation and analysis for the administration of consumer identity information and mobile device user information through issuance of tokenized IDs for business management and risk management; Computer services, namely, providing verification services using technology to authenticate mobile device user identity; Consulting services pertaining to user authentication services for ecommerce transactions
36 - Services financiers, assurances et affaires immobilières
Produits et services
Financial transaction services in connection with accounts linked to a purchaser's mobile phone, namely, providing secure commercial transactions and payment options for purchase of goods or services on the internet and in other retail locations and for electronic funds transfer
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Platform as a service, namely, non-downloadable software for use in mobile identity verification and authentication services by means of leveraging signals from the core telecom infrastructure and other identity verifiers to verify identity across all channels in particular mobile device, the internet and call centers, all within a privacy first, zero knowledge framework; electronic signature verification services using technology to authenticate user identity by means of leveraging signals from the core telecom infrastructure and other identity verifiers to verify identity across all channels in particular mobile device, the internet and call centers, all within a privacy first, zero knowledge framework; providing users authentication services by means of leveraging signals from the core telecom infrastructure and other identity verifiers to verify identity across all channels in particular mobile device, the internet and call centers, all within a privacy first, zero knowledge framework
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing a secure, web-based service featuring technology that enables users to verify and authenticate subscribers across multiple mobile devices and via mobile operator networks, wireless internet, wireless networks cable networks
99.
System and method for paying a merchant by a registered user using a cellular telephone account
G06Q 20/32 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des dispositifs sans fil
G06Q 20/06 - Circuits privés de paiement, p. ex. impliquant de la monnaie électronique utilisée uniquement entre les participants à un programme commun de paiement
G06Q 20/16 - Paiements effectués par le biais de systèmes de télécommunication
G06Q 20/26 - Schémas de débit, c.-à-d. de "paiement immédiat"
G06Q 20/28 - Schémas de prépaiement, c.-à-d. de "paiement préalable"
G06Q 20/34 - Architectures, schémas ou protocoles de paiement caractérisés par l'emploi de dispositifs spécifiques utilisant des cartes, p. ex. cartes à puces ou cartes magnétiques
G06Q 30/06 - Transactions d’achat, de vente ou de crédit-bail
H04M 15/00 - Dispositions de comptage, de contrôle de durée ou d'indication de durée
G06Q 20/12 - Architectures de paiement spécialement adaptées aux systèmes de commerce électronique
G06Q 20/40 - Autorisation, p. ex. identification du payeur ou du bénéficiaire, vérification des références du client ou du magasinExamen et approbation des payeurs, p. ex. contrôle des lignes de crédit ou des listes négatives
A mobile phone number that is been provided by a customer during enrollment is verified for use. SS7 protocol data associated with the mobile phone number is collected and evaluated, and if the condition of the subscriber account associated with phone number has changed or is inconsistent with the circumstances surrounding the enrollment of the phone number, the phone number is designated as one that is not to be called.
H04M 3/38 - Dispositions de service gradué, c.-à-d. interdiction à quelques abonnés d'établir certaines connexions
H04M 7/12 - Dispositions d'interconnexion entre centres de commutation pour l'exploitation entre centraux comportant différents types d'équipement de commutation, p. ex. à entraînement mécanique et pas à pas ou décimal et non décimal
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04M 1/677 - Dispositions pour empêcher la composition ou l'émission de numéros prédéterminés de téléphone ou de types sélectionnés de numéros de téléphone, p. ex. numéros à longue distance