Claims
- 1. A method for verifying an identity of a new-user of a computer system, comprising:
a. receiving at least one identity attribute from the new-user; b. similarity searching the at least one new-user identity attribute against at least one database of denied-user identity attributes; c. receiving a similarity search result; d. determining a positive or negative match between the at least one new-user identity attribute and the denied-user identity attributes; e. allowing the new-user to access the computer system, where a negative match has been determined; and f. denying the new-user access to the computer system, where a positive match has been determined.
- 2. The method of claim 1, wherein the at least one new-user identity attribute comprises a new-user profile.
- 3. The method of claim 2, wherein the at least one database of denied-user identity attributes comprises at least one database of denied-user profiles.
- 4. The method of claim 3, wherein the step of similarity searching comprises similarity searching the new-user profile against the at least one denied-user profile database.
- 5. The method of claim 1, wherein the step of determining a positive or negative match further comprises comparing the similarity search result to a first match tolerance level.
- 6. The method of claim 5, wherein a positive match comprises a match, between the at least one new-user identity attribute and at least one denied-user identity attribute, that meets or exceeds the first match tolerance level.
- 7. The method of claim 5, wherein a negative match comprises a match, between the at least one new-user identity attribute and at least one denied-user identity attribute, that does not meet or exceed the first match tolerance level.
- 8. The method of claim 1, further comprising, where a positive match has been determined, verifying the positive match via a secondary review, after the step of determining whether a positive or negative match exists and before the step of denying the new-user access to the computer system.
- 9. The method of claim 8, wherein the step of verifying the positive match further comprises comparing the similarity search result to a second match tolerance level.
- 10. The method of claim 8, further comprising allowing the new-user to access the computer system, where the positive match does not meet or exceed the second match tolerance level.
- 11. The method of claim 8, further comprising denying the new-user access to the computer system, where the positive match meets or exceeds the second match tolerance level.
- 12. The method of claim 1, further comprising, after determining whether a positive or negative match exists, the steps of:
adding the new-user identity to at least one database of valid user identities, where a negative match has been determined; and adding the new-user identity attributes to the at least one database of denied-user identity attributes, where a positive match has been determined.
- 13. The method of claim 1, wherein the at least one new-user identity attribute is received from at least one component, chosen from a group consisting of Internet web sites, relational databases, data entry systems, and hierarchical databases.
- 14. The method of claim 1, wherein the similarity search result comprises at least one hierarchical document stored in the at least one database of denied-user identity attributes.
- 15. A software program embodied on a computer-readable medium incorporating the method of claim 1.
- 16. A method for verifying an identity of a new-user of a computer system, comprising:
a. receiving at least one identity attribute from the new-user; b. similarity searching the at least one identity attribute against at least one database of denied-user identity attributes; c. receiving a similarity search result; d. determining a positive or negative match between the at least one new-user identity attribute and the denied-user identity attributes; e. allowing the new-user to access the computer system and adding the new-user identity to at least one database of valid user identities, where a negative match has been determined; f. where a positive match has been determined, verifying the positive match via a secondary review; g. allowing the new-user to access the computer system and adding the new-user identity to at least one database of valid user identities, where the positive match is not verified; and h. denying the new-user access to the computer system and adding the at least one new-user identity attribute to at least one database of denied-user identity attributes, where the positive match is verified.
- 17. The method of claim 16, wherein the at least one new-user identity attribute comprises a new-user profile.
- 18. The method of claim 17, wherein the at least one database of denied-user identity attributes comprises at least one database of denied-user profiles.
- 19. The method of claim 18, wherein the step of similarity searching comprises similarity searching the new-user profile against the at least one denied-user profile database.
- 20. The method of claim 16, wherein the step of determining a positive or negative match further comprises comparing the similarity search result to a first match tolerance level.
- 21. The method of claim 20, wherein a positive match comprises a match, between the at least one new-user identity attribute and at least one denied-user identity attribute, that meets or exceeds the first match tolerance level.
- 22. The method of claim 20, wherein a negative match comprises a match, between the at least one new-user identity attribute and at least one denied-user identity attribute, that does not meet or exceed the first match tolerance level.
- 23. The method of claim 16, wherein the step of verifying the positive match further comprises comparing the similarity search result to a second match tolerance level.
- 24. The method of claim 1, wherein the at least one new-user identity attribute is received from at least one component, chosen from a group consisting of Internet web sites, relational databases, data entry systems, and hierarchical databases.
- 25. The method of claim 1, wherein the similarity search result comprises at least one hierarchical document stored in the at least one database of denied-user identity attributes.
- 26. A software program embodied on a computer-readable medium incorporating the method of claim 16.
- 27. A system for verifying an identity of a new-user of a computer system, comprising:
a means for receiving at least one identity attribute from the new-user; at least one database for storing denied-user identity attributes; at least one database for storing valid user identities; a means for similarity searching the at least one identity attribute against the at least one database of denied-user attributes; a means for determining a positive or negative match between the at least one new-user attribute and the at least one database of denied-user identity attributes; a means for allowing the new-user to access the computer system, where a negative match has been determined; a means for denying the new-user access to the computer system, where a positive match has been determined; a means for adding the new-user identity to the at least one database for storing valid user identities, where a negative match has been determined; and a means for adding the at least one new-user identity attribute to the at least one database of denied-user attributes, where a negative match has been determined.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] Referenced-applications
[0002] This application claims the benefit of U.S. Provisional Application 60/201 073, filed Apr. 26, 2000.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60201073 |
Apr 2000 |
US |