IDENTITY CREDENTIAL VERIFICATION TECHNIQUES

Embodiments of the present disclosure are directed to, among other things, improving data security with respect to data collection, verification, and authentication techniques associated with obtaining and transmitting identity information. For example, an identification credential may be received (...

Full description

Saved in:
Bibliographic Details
Main Authors Elliott, Thomas, Borges, Daniel R, Marri Sridhar, Subash, Pantfoerder, Achim, Bergerengen, Johan O, Graff, Irene M
Format Patent
LanguageEnglish
Published 24.10.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Embodiments of the present disclosure are directed to, among other things, improving data security with respect to data collection, verification, and authentication techniques associated with obtaining and transmitting identity information. For example, an identification credential may be received (e.g., via a short-range communications protocol such as iBeacon) by a first device from a second device. The credential may be associated with a second user of the second device. The first device may verify the credential and, if valid, an additional option to approve a secure communications channel may be presented at the first device. If the additional option is selected, a secure communications channel may be established between the first device and the second device.
Bibliography:Application Number: US201816122321