Abstract: Systems and methods for enhancing the security of an electronic database system. The system has a registry server hosting a registry database accessible by a registry user, and an authorization server hosting an authorization database. In operation, the registry server queries the authorization server to determine whether a particular record is locked. When a record is locked, an authorization service key is requested from the registry server and verified by the authorization server.
Type:
Grant
Filed:
March 4, 2016
Date of Patent:
April 12, 2022
Assignee:
Authenticor Identity Protection Services Inc.
Inventors:
Gregory Howard Wolfond, Jaime Shapiro, Patrick Hans Engel, Pierre Antoine Roberge
Abstract: A method for authenticating an identity involves a computing device receiving a first credential over a first communications channel, and determining a second communications channel from a comparison between the first received credential and a first reference credential provisionally associated with the first credential. The computing device opens the second communications channel and receives second credential over the second communications channel, and the identity is authenticated based on a verification of the second credential. The computing device authenticates the identity by generating a first identity proof score from a correlation between the first received credential and the first reference credential, generating a second identity proof score from a correlation between the second received credential and a second reference credential, and generating an ultimate identity proof score from the first identity proof score and the second identity proof score.
Type:
Grant
Filed:
May 9, 2011
Date of Patent:
July 9, 2013
Assignee:
Authenticor Identity Protection Services Inc.
Inventors:
Gregory Howard Wolfond, Jaime Shapiro, Robert Paul Mansz
Abstract: A method for authenticating an identity involves first receiving a first credential over a first communications channel, and determining a second communications channel provisionally associated with the first credential. The second communications channel is different from the first communications channel, and the first credential is provisionally associated with an identity. Then, a second credential is received over the second communications channel, and the identity is authenticated based on a verification of the second credential.
Type:
Grant
Filed:
January 13, 2006
Date of Patent:
May 10, 2011
Assignee:
Authenticor Identity Protection Services, Inc.
Inventors:
Gregory Howard Wolfond, Jaime Shapiro, Robert Paul Mansz
Abstract: A method for protecting real estate from fraudulent changes in title begins by receiving a verification that a party requesting a change in title to a specific item of real estate is the true owner of the specific item of real estate. A title change authorization is provided if the identity of the requesting party is verified. A verification is received if the individual is a trusted authority authorized to modify title to real estate. The individual is authorized to effect the change in title to the specific item of real estate in accordance with the title change authorization.
Type:
Application
Filed:
January 8, 2008
Publication date:
May 20, 2010
Applicant:
Authenticor Identity Protection Services Inc.
Inventors:
Gregory Howard Wolfond, Jaime Shapiro, Patrick Hans Engel, Pierre Antoine Roberge