Providing access control and identity verification for communications when initiating a communication to an entity to be verified

التفاصيل البيبلوغرافية
العنوان: Providing access control and identity verification for communications when initiating a communication to an entity to be verified
Patent Number: 12021,866
تاريخ النشر: June 25, 2024
Appl. No: 16/861663
Application Filed: April 29, 2020
مستخلص: The techniques herein are directed generally to providing access control and identity verification for communications when initiating a communication to an entity to be verified. In one particular embodiment, an illustrative method according to one or more embodiments of the present disclosure may comprise: initiating, from an initiating device, a communication to a receiving device on a communication channel; determining, by the initiating device over a verification channel with a verification service, whether an identity associated with the receiving device is verified by the verification service; managing, by the initiating device in response to the identity associated with the receiving device being verified, the communication to the receiving device according to the identity being verified; and managing, by the initiating device in response to the identity associated with the receiving device being unverified, the communication to the receiving device according to the identity being unverified.
Inventors: Journey.ai (Denver, CO, US)
Assignees: Journey.ai (Denver, CO, US)
Claim: 1. A method, comprising: initiating, from an initiating device, a communication to a receiving device on a communication channel; determining, by the initiating device over a verification channel with a verification service associated with the initiating device, whether an identity of a particular user is verified by the verification service based on whether or not the particular user has logged into a verification service client application on the receiving device, wherein, prior to initiating the communication, the verification service establishes accounts for users of the verification service client application and determines that identities of the users are attested by an attestation service during account establishment; managing, by the initiating device in response to the identity of the particular user using the receiving device being verified and thus already attested by the attestation service during the account establishment, the communication to the receiving device according to the identity being verified and thus already attested; and managing, by the initiating device in response to the identity of the particular user using the receiving device being unverified, the communication to the receiving device according to the identity being unverified.
Claim: 2. The method as in claim 1 , wherein initiating the communication to the receiving device on the communication channel is prior to determining whether the identity of the user using the receiving device is verified by the verification service, the method further comprising: initiating verification of the identity during the communication.
Claim: 3. The method as in claim 2 , wherein initiating verification of the identity during the communication comprises: invoking the verification service client application on the receiving device to obtain verification.
Claim: 4. The method as in claim 1 , further comprising: prompting the receiving device to install the verification service client application to then verify the identity of the user using the receiving device.
Claim: 5. The method as in claim 1 , further comprising: determining that the identity of the user using the receiving device is unverified in response to expiration of a time limit prior to obtaining verification.
Claim: 6. The method as in claim 1 , wherein determining whether the identity of the user using the receiving device is verified by the verification service prior to initiating the communication to the receiving device on the communication channel.
Claim: 7. The method as in claim 1 , further comprising: informing the verification service, over the verification channel, of an intention to initiate the communication to the receiving device, causing the verification service to relay the intention to the receiving device.
Claim: 8. The method as in claim 7 , wherein the intention comprises a particular time of initiating the communication.
Claim: 9. The method as in claim 7 , further comprising: receiving a response to the intention, via the verification channel, requesting initiating the communication at a particular time, wherein the initiating device initiates the communication according to the particular time.
Claim: 10. The method as in claim 1 , further comprising: receiving a prompt from the verification service client application on the receiving device to initiate the communication, wherein the initiating device initiates the communication in response to the prompt.
Claim: 11. The method as in claim 10 , wherein the prompt is associated with a particular time for the communication, and wherein the initiating device initiates the communication according to the particular time.
Claim: 12. The method as in claim 1 , wherein determining that the identity of the user using the receiving device is verified by the verification service is based on the verification service client application on the receiving device verifying the identity.
Claim: 13. The method as in claim 12 , wherein the verification service client application has verified the identity of the user using the receiving device prior to the initiating device initiating the communication, and wherein the verification service conveys that the identity of the user using the receiving device is verified to the initiating device over the verification channel in order for the initiating device to determine that the identity of the user using the receiving device is verified by the verification service.
Claim: 14. The method as in claim 12 , wherein the communication is initiated prior to the verification service client application verifying the identity of the user using the receiving device, and wherein the verification service client application is caused to activate during the communication to perform verification of the identity of the user using the receiving device.
Claim: 15. The method as in claim 1 , wherein determining that the identity of the user using the receiving device is unverified by the verification service is based on the verification service client application not being installed on the receiving device.
Claim: 16. The method as in claim 1 , further comprising: managing the communication to the receiving device according to the identity being unverified based specifically on one of either the verification service client application on the receiving device being unable to verify the identity or in response to the verification service client application not being installed on the receiving device.
Claim: 17. The method as in claim 1 , wherein determining whether the identity of the user using the receiving device is verified by the verification service comprises: requesting the user to comply with one or more multi-factor authentication (MFA) queries over the verification channel.
Claim: 18. The method as in claim 1 , wherein managing the communication to the receiving device according to the identity being verified comprises one or more of: sharing secure information over the communication; allowing transaction requests received over the communication; modifying information associated with the verified identity; and continuing the communication.
Claim: 19. The method as in claim 1 , wherein managing the communication to the receiving device according to the identity being verified comprises: receiving one or more identity attributes associated with the identity selected from a group consisting of: a name; an account number; an identification number, a verification level; a demographic; and a treatment level.
Claim: 20. The method as in claim 1 , wherein managing the communication to the receiving device according to the identity being unverified comprises one or more of: preventing sharing secure information over the communication; preventing transaction requests received over the communication; preventing sharing of information associated with the unverified identity; preventing requests for modification of information associated with the unverified identity; instructing against sharing secure information over the communication; instructing against performing transaction requests received over the communication; instructing against sharing of information associated with the unverified identity; instructing against modification of information associated with the unverified identity; treating the communication with an unverified identity; and discontinuing the communication.
Claim: 21. The method as in claim 1 , wherein the communication is selected from a group consisting of: a user-to-user communication; a user-to-enterprise communication; and an enterprise-to-user communication.
Claim: 22. The method as in claim 1 , wherein the identity of the user using the receiving device is verified without the initiating device accessing personally identifying information (PII) associated with the identity.
Claim: 23. The method as in claim 1 , wherein the communication is selected from a group consisting of: a voice communication; a video communication; a text communication; an email communication; and a data communication.
Claim: 24. The method as in claim 1 , wherein the identity of the user using the receiving device is verified based on one or more authentication factors selected from a group consisting of: facial recognition; fingerprint recognition; iris recognition; device location information; social security number input; federal identification number input; password input; pin input; security question input; and credit card code input.
Claim: 25. The method as in claim 1 , wherein the identity of the user using the receiving device is verified based on one or more authentication factors input at the receiving device, and wherein determining whether the identity of the user using the receiving device is verified by the verification service occurs without access to any authentication factors input at the receiving device.
Claim: 26. The method as in claim 1 , further comprising: sending an identity verification request to the receiving device during the communication.
Claim: 27. The method as in claim 26 , further comprising: receiving a verification of identity in response to the identity verification request without access to any verification response input at the receiving device.
Claim: 28. The method as in claim 1 , further comprising, in response to the identity being verified: requesting an increased assurance of verification of the identity by the receiving device during the communication; and managing the communication to the receiving device according to whether an increased assurance is conveyed.
Claim: 29. The method as in claim 28 , wherein requesting the increased assurance of verification of the identity occurs automatically in response to one or more triggers during the communication.
Claim: 30. The method as in claim 1 , further comprising: receiving an identity verification request from the receiving device during the communication; and responding to the identity verification request to the receiving device.
Claim: 31. The method as in claim 30 , wherein receiving the identity verification request and responding to the identity verification request occurs via the verification channel.
Claim: 32. The method as in claim 1 , further comprising: displaying a verification level of the receiving device.
Claim: 33. The method as in claim 1 , further comprising: determining that the identity of the user using the receiving device is verified based on receiving a verification token; and passing the verification token from the initiating device to a second device to cause the second device to determine that the identity of the user using the receiving device is verified based on receiving the verification token.
Claim: 34. The method as in claim 1 , further comprising: determining that the identity of the user using the receiving device is verified based on receiving an unexchangeable verification token.
Claim: 35. The method of claim 1 , further comprising: determining, by the verification service, that the identity of the particular user is attested without disclosing confidential information of the particular user to the initiating device.
Claim: 36. An apparatus, comprising: one or more network interfaces to communicate on a communication channel; one or more network interfaces to communicate on a verification channel; a processor adapted to execute one or more processes; and a memory configured to store a process executable by the processor, the process when executed operable to perform a method comprising: initiating a communication to a receiving device on the communication channel; determining, over the verification channel with a verification service associated with the apparatus, whether an identity of a particular user is verified by the verification service based on whether or not the particular user has logged into a verification service client application on the receiving device, wherein, prior to initiating the communication, the verification service establishes accounts for users of the verification service client application and determines that identities of the users are attested by an attestation service during account establishment; managing, in response to the identity of the particular user using the receiving device verified and thus already attested by the attestation service during the account establishment, the communication to the receiving device according to the identity being verified and thus already attested; and managing, in response to the identity of the particular user using the receiving device being unverified, the communication to the receiving device according to the identity being unverified.
Claim: 37. A tangible, non-transitory, computer-readable medium storing program instructions that cause a computer to execute a process comprising: initiating a communication to a receiving device on a communication channel; determining, over a verification channel with a verification service associated with the computer, whether an identity of a particular user is verified by the verification service based on whether or not the particular user has logged into a verification service client application on the receiving device, wherein, prior to initiating the communication, the verification service establishes accounts for users of the verification service client application and determines that identities of the users are attested by an attestation service during account establishment; managing, in response to the identity of the particular user using the receiving device being verified and thus already attested by the attestation service during the account establishment, the communication to the receiving device according to the identity being verified and thus already attested; and managing, in response to the identity of the particular user using the receiving device being unverified, the communication to the receiving device according to the identity being unverified.
Patent References Cited: 8819803 August 2014 Richards
10117098 October 2018 Naguthanawala
10325259 June 2019 Shahidzadeh
10389874 August 2019 Farnsworth
11089028 August 2021 Alpaugh
20010020228 September 2001 Cantu
20030163700 August 2003 Paatero
20050227680 October 2005 Snowden
20060005237 January 2006 Kobata
20120144198 June 2012 Har
20130111205 May 2013 Biswas
20130339726 December 2013 Yoshida et al.
20140223573 August 2014 Reedy et al.
20140230038 August 2014 Leong
20140310782 October 2014 Vanderveen
20140317413 October 2014 Deutsch
20160253481 September 2016 Tian
20170250816 August 2017 Popa et al.
20170318152 November 2017 Chen
20180013562 January 2018 Haider et al.
20180139206 May 2018 Ezell
20180176372 June 2018 Algard
20180278746 September 2018 Yacov
20180375860 December 2018 Gandhi
20190149539 May 2019 Scruby
20190325129 October 2019 Wang
20190349372 November 2019 Smith
20200042723 February 2020 Krishnamoorthy
20110071201 June 2011
101721582 March 2017
Other References: International Search Report dated Apr. 19, 2020 in connection with PCT Application No. PCT/US2019/64562. cited by applicant
Primary Examiner: Abyaneh, Ali S
Attorney, Agent or Firm: BEHMKE INNOVATION GROUP LLC
Behmke, James M.
Schofield, Andy L.
رقم الانضمام: edspgr.12021866
قاعدة البيانات: USPTO Patent Grants