Browse Prior Art Database

A Method and System for Verifying User Identity and Possession of a Card

IP.com Disclosure Number: IPCOM000239680D
Publication Date: 2014-Nov-24
Document File: 1 page(s) / 30K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method and system for verifying user identity and possession of a card is disclosed. The method and system provides an alternative and secure approach of verification by analyzing user response performance for a challenge used to verify user identity.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 65% of the total text.

Page 01 of 1

A Method and System for Verifying User Identity and Possession of a Card

Currently, theft and fraud access of credit cards and identity cards occurs very often in commercial and industrial security world. In order to overcome the theft and fraud , conventional systems verify physical possession of the card. The verification process is carried out by a third party observer who may or may not be compromised , or by inputting a code printed on the card.

Disclosed is a method and system for verifying user identity and possession of a card . The method and system of verifying the user identity is performed by a stand -alone device which is embedded in a smart device or a physical reader device . The smart device can be, but need not be limited to, a phone, tablet, watch, jewelry and the like. In order to verify the user identity and physical presence of the user , communication is established between a central system and a smart device of the user . The communication can be established through Bluetooth *, phone, Transmission Control Protocol (TCP) / Internet Protocol (IP) and the like. Further, the communication established between the central system and the smart device of the user is encrypted to provide data security.

The method includes initiating a challenge to a user for verifying the user identity . The user identity is analyzed based on responses provided by the user. The responses can be kinetic actions which can include, but need not be limited to, tapping...