The subject matter disclosed herein relates generally to identity verification and, more specifically, to acquiring identity information from two or more devices to determine whether to allow a transaction.
In recent years, many kinds of marketplace transactions have tended to become more electronically based. Transactions such as withdrawing cash from a bank account, purchasing an item at a retail store, purchasing movie tickets, etc. are commonly performed using credit cards, cell phones, or other electronic devices. Conducting such transactions electronically is fast and convenient and may, in some cases, reduce the need for a clerk or cashier to be involved in the transaction. Often, the identity of the person making a purchase may be established by providing a single identification device, such as a credit card or driver's license, for example. Moreover, simply possessing the device used to conduct the transaction may often be considered sufficient evidence to verify identity and allow the transaction. However, if identity can be proven by presenting only one such device, the risk of falsely approving a transaction increases, due to the possibility of an unapproved person acquiring the single device. It may be desirable, therefore, to provide a system that acquires identity information electronically from two or more devices before approving a transaction.
Embodiments of the present invention provide systems and methods for acquiring identity information from a variety of electronic devices to determine whether to approve a requested transaction. The identity information may be acquired electronically from one or more “identity instruments,” which may be in the possession of the person requesting the transaction. Examples of such identity instruments may include credit cards, mobile phones, or other personal effects or possessions that may be fitted with a wireless transmitter, such as clothing, a keychain, an automobile, etc. In various embodiments, identity information may be acquired from a plurality of identity instruments and the transaction may be approved or denied based on the number of identity instruments, the types of identity information provided, and the level of security specified for the requested transaction. By verifying a person's identity electronically, using a plurality of identity instruments, identity may be quickly verified while also reducing the risk of identity theft.
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Additionally, the reader 12 may be coupled to a database 16 through a network 18. The database 16 may be used to consummate the requested transaction, such as a bank withdrawal, purchase, etc. Moreover, the database 16 may include information used by the reader 12 to verify the customer's identity. For example, if the transaction is to be approved upon receiving a valid identification code from the identity instruments 14, the database 16 may include a list of identification codes associated with particular customers, and the validity of the identification code may be determined by comparing the identification code provided by the identity instruments 14 to the information stored in the database 16.
Using the system 10 described above, various techniques for verifying identity may be implemented, some of which will be described below. In some embodiments, the customer's identity may be verified if valid identifying information is provided by a specified number of particular identity instruments 14. In other embodiments, the customer's identity may be verified if valid identifying information is provided by a subset of several possible identity instruments 14. The particular technique used to verify identity may vary depending on, among other things, the level of security desired, the type or size of the transaction attempted, other transactions performed within a specific time frame, and so forth. For example, various techniques may use cryptography to reduce the likelihood that the identity information stored on any single identity instrument 14 may be used illicitly. Various non-limiting examples of techniques used in the system 10 to verify identity are described below.
In one embodiment, the reader 12 may calculate a confidence score (or an equivalent derived value or rating) based on the identity information provided by the identity instruments 14, and the transaction may be approved or disapproved after comparing the confidence score to a threshold confidence level applicable to the transaction. For example, the confidence score may be related to the number of identity instruments 14 that have provided valid identity information. In this way, a greater number of identity instruments 14 may increase the confidence score and, therefore, increase the likelihood that the transaction will be approved. The threshold confidence level may be used to set a security level for various types of transactions, and may relate to the number of identity instruments 14 expected to provide valid identity information before approving a transaction. For example, certain low security transactions may be associated with a low threshold confidence level, wherein a single identity instrument may be used to verify identity, while high security transactions may be associated with a higher threshold confidence level, wherein two, three, four, five or more identity instruments 14 may be used to verify identity.
Furthermore, some identity instruments 14 may be more reliable indicators of identity than others. Therefore, in the calculation of the confidence score each of the identity instruments 14 may be weighted according to the relative likelihood that the type of instrument provided would only be in the possession of the customer bearing such item. In some embodiments, therefore, the identity information provided by the identity instruments 14 may include a weighting factor that indicates the weight to be given to the particular identity instrument 14 providing the identity information.
For example, in one embodiment, a first identity instrument 14 may be given a weight of 4x, a second and third identity instrument 14 may both be given a weight of 2x, and a forth identity instrument 14 may be given a weight of 1x. Furthermore, the threshold confidence level of the requested transaction may be 5x. With this arrangement, the requested transaction may be approved if the customer possesses the first identity instrument 14 and any one of the other three identity instruments 14 (e.g. 4x+2x=6x). If however, the customer is not in possession of the first identity instrument 14, the transaction may still be approved if the customer possesses all three of the second, third, and forth identity instruments 14 (e.g. 2x+2x+1x=5x).
For another example, in one embodiment, a certain device or possession of the customer may be designated as a “gateway” identity instrument 14, such that no transaction may be approved without presenting at least the gateway identity instrument 14 plus at least one other identity instrument 14. For example, the gateway identity instrument 14, such as mobile phone, may be given a relative weight of 10x, while several additional identity instruments 14 may be given a weight of 1x. Furthermore, the threshold confidence level of a requested transaction may be 12x. With this arrangement, the requested transaction may only be approved if the customer possesses the mobile phone and any two additional identity instruments 14 (10x+1x+1x=12x).
In some embodiments, the system 10 may, in some embodiments, use a method of cryptography, such as “secret sharing,” in which case, the identity information provided by some or all of the identity instruments 14 may include encoded data that may be used to reproduce an identity verification code. In this embodiment, the identity information contained on each of the identification instruments 14 may include code variables relating to an identity verification code and instructions for reproducing the identity verification code from the code variables provided. Both the code variables, referred to herein as the secret sharing data (SSD), and the instructions for reproducing the identity verification code, referred to herein as the secret sharing identification information (SSID), may be provided to the reader 12 so that the reader can reproduce the identity verification code according to the data and instructions provided. In such an embodiment, the approval of a transaction may include acquiring the SSD and SSID from the available identity instruments 14, using the acquired data to calculate the identity verification code, and verifying the validity of the identity verification code by comparing the identity verification code to information contained in the database 16.
In this embodiment, unique sets of code variables may be distributed among a total number of identity instruments 14, T, such that a predetermined subset of identity instruments 14, K, may be used to reproduce the identity verification code. For example, if T equals two and K equals two, then code variables are distributed among two identity instruments 14 and both of the identity instruments 14 are used to reproduce the identity verification code. For another example, if T equals four and K equals three, then code variables may be distributed among four identity instruments 14, but the identity verification code may be determined based on the code variables provided by any three of the identity instruments 14.
It will be appreciated that in a secret sharing system no single identity instrument alone will provide significant clues regarding the identity verification code. For example, in a secret sharing system, the number of code variables provided by each identity instrument may equal the number of variables in the identity verification code. In the secret sharing system, therefore, no single identity instrument 14 may be used to determine the identity verification code or to even significantly narrow the range of additional variables needed to reproduce the identity verification code. In this way, the security of the system 10 may not be compromised in the event that a single identity instrument 14 were subject to illicit use by an unauthorized user, because the information provided by a single identity instrument 14 may not be used to provide significant information about the identity verification code. As can be appreciated from the examples given above, a wide range of techniques for approving a transaction may be implemented using the system 10, and the above examples are not intended to describe all of the possible embodiments encompassed by the present disclosure.
Other aspects of the system 10 may be better understood with reference to
Some of the identity instruments 14 may include a wireless communications device such as a near field communications (NFC) device 28 or RFID tag 30. As such, the reader 12 may acquire identity information from the identity instruments 14 by transmitting an interrogation signal and listening for any return signals from the identity instruments 14. The return signals sent by the identity instruments 14 back to the reader 12 may include the identity information. The identity information may then be used by the reader 12 to verify identity and approve the requested transaction. The identity instruments 14 may be any device or possession of a customer that may be suitably fitted with a wireless transmitter. A non-exclusive list of possible wireless identity instruments 14 may include a cell phone 14C, a keychain 14D, an identification card 14E, passport 14F, eyeglasses 14G, or an automobile 14H.
Identity information may also be acquired by the reader 12 non-wirelessly. For example, if additional identity information is requested by the reader 12, the reader 12 may prompt the customer to swipe additional bank cards 14A through the card reader 22 or to present a loyalty card 14B to be read by the barcode reader 24. Furthermore, one of the identity instruments 14 may also be used to initiate the transaction.
A wide range of possible transactions may be performed using the system 10 described in
For another example, in some embodiments, the reader 12 may be used to provide entry into a secured facility. In such embodiments, a person seeking entry may pass through a checkpoint that includes a reader 12. The reader 12 may be configured to detect the presence of a person seeking admittance, at which time the reader 12 may conduct a search for identity instruments 14 by transmitting a wireless interrogation signal. Upon detection of the wireless interrogation signal, one or more identity instruments 14, such as an ID card 14E or a keychain 14D, may send a return signal carrying the identity information. In the case of a vehicular checkpoint, one of the identity instruments 14 may be the vehicle 14H equipped with an RFID tag 30. The reader 12 may then allow or disallow entry based on the sufficiency of the identity information provided by the identity instruments 14. Furthermore, in the case of an unmanned checkpoint, the reader 12 may allow entry electronically, such as by unlocking a door or opening a gate.
It will be appreciated that in the embodiments described above, a single reader 12 serves to acquire the provided identity information, and that all of the identity instruments 14 are within close proximity to the reader 12. These aspects are not intended, however, to be limitations of the present invention. For example, in one embodiment, which is described below in reference to
Turning first to
Turning now to
Turning now to
After the initiation of the transaction, the method 40 may advance to step 44, wherein identity information is acquired. As discussed above, in relation to
Next, at step 46, a determination is made as to whether identity has been sufficiently established so that it is safe to proceed with the present transaction. In secret sharing embodiments, determining whether identity has been sufficiently established may involve calculating the identity verification code based on the code variables provided. In such embodiments, the identity verification code may be validated by comparing it to information stored on the database 16. In other embodiments, determining whether identity has been sufficiently established may involve calculating a confidence score based on the identity information provided and comparing the confidence score to a threshold confidence level. The threshold confidence level may be determined based on the type of transaction requested. For example, if the requested transaction involves a purchase, the threshold confidence level may be based on the overall cost of the purchase, with the threshold confidence level increasing for higher cost purchases. For another example, if the transaction involves entry into a secure location, various locations within a facility may be assigned higher or lower threshold confidence levels, depending on the relative level of security desired for each location. In such embodiments, it will be appreciated that certain low threshold transactions, such as low cost purchases, may be approved based on the identity information provided by a single identity instrument 14.
If the customer identity is sufficiently verified, e.g. the identity verification code is validated or the calculated confidence score is above the threshold confidence level, then the method may advance to step 48, wherein the transaction is approved. If the customer identity is not sufficiently verified, however, then the method 40 may advance to step 50, wherein a determination is made as to whether additional identity information is available. During this step, the reader 12 may, in some embodiments, search for additional identity instrument 14 wirelessly or prompt a customer to provide an additional identity instrument 14 to be scanned, as discussed above in relation to
If additional identity instruments are available, then the method 40 may return to step 44, wherein the new identity information is acquired and combined with the previously provided identity information. Steps 44, 46, and 50 may be repeated until either no additional identity instruments 14 are available or the transaction is approved.
If additional identity instruments are not available, then the method 40 may advance to step 52, in which a determination is made as to whether the transaction may be modified, e.g. reducing the threshold confidence level of the transaction by reducing the purchase cost, etc. If the transaction is not modifiable, then the method 40 advances to step 54 and the transaction is aborted. Otherwise, if the transaction is modifiable, then the method 40 proceeds to step 56 and the transaction is modified.
The modification of the transaction may include any suitable modification that allows the transaction to be approved. For example, in some embodiments, biometric information may be acquired from the customer, such as a finger print, photograph, or eye scan, for example. The biometric information may then be compared to other biometric information stored in the database 16, or the biometric information may be stored in the database 16 to allow for recourse in the event of a wrongfully approved transaction. In other embodiments, the modification of the transaction may involve providing additional forms of non-electronic identification, such as a social security card or a driver's license, for example. The non-electronic identification may be received by an operator of the reader 12 who may then manually approve the transaction or reduce the threshold confidence level applied to the transaction, accordingly. In yet other embodiments, the modification of the transaction may involve reducing the monetary cost of the transaction, such as by eliminating certain items from the purchase. As such, the threshold confidence level used for the transaction may be reduced to a level that is below the confidence score calculated based on the identity information provided by the identity instruments 14. After suitably modifying the transaction, the method may then proceed to step 48, wherein the transaction is approved.
The systems and methods described above may provide fast, secure, electronically-based techniques for verifying identity. Technical effects of the invention include the approval or denial of a transaction, such as a financial transaction or admittance to a secure area, based on identity information provided by a plurality of electronic devices.
While only certain features of the invention have been illustrated and described herein, many modifications and changes will occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.