The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 03, 2021

Filed:

Aug. 01, 2018
Applicant:

Intuit Inc., Mountain View, CA (US);

Inventors:

Antonio Fuentes, Carlsbad, CA (US);

Douglas L. Foiles, San Diego, CA (US);

Jeremy Luchau, San Diego, CA (US);

Ergang Sun, San Diego, CA (US);

Assignee:

INTUIT INC., Mountain View, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/31 (2013.01); G06F 21/33 (2013.01); H04L 29/08 (2006.01); H04W 8/18 (2009.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
G06F 21/316 (2013.01); G06F 21/335 (2013.01); H04L 63/102 (2013.01); H04L 67/306 (2013.01); H04W 8/18 (2013.01); H04L 63/20 (2013.01);
Abstract

Certain aspects of the present disclosure provide techniques for determining an identity of a user requesting access to a resource. An example technique for determining the identity of the user includes, upon receiving a request for a resource, determining the identity assurance strength of the user. The determination of the identity assurance strength of the user is based on personal identifying information, risk signals, user history, and the like. If the user does not have the requisite identity assurance strength to access a resource, based on policy criteria, an identity proofing operation may be determined for the user to complete in order to access the resource, where the operation is determined based on policy criteria, risk signals, and the like. Upon completion of the identity assurance operation, if the user has adequate identity assurance strength, then the user may access the resource.


Find Patent Forward Citations

Loading…