摘要 |
The present invention relates to the field of identity verification. More specifically, the present invention relates to methods and systems for verifying the identity of an individual. The method for verifying the identity of an individual includes the step of transmitting from a customer system to a customer connector server a request for identity verification containing identification information provided by the individual to be identified. At the customer connector server, at least one verification service required to satisfy the request for identity verification is identified from the request for identity verification. An appropriate data manager server from a plurality of data manager servers is selected for each verification service, based on a first set of predetermined criteria. A corresponding request for verification service is then transmitted to each appropriate data manager server. At each appropriate data manager server, at least one data access service required to permit the identification information provided by the individual to be verified against identity information relating to the individual contained within the at least one data source, is identified from the corresponding request for verification service. An appropriate data connector server from a plurality of data connector servers is thereafter selected for each data access service, based on a second set of predetermined criteria. Subsequently, a corresponding request for data access service is transmitted to each appropriate data connector server. At least one data source is accessed from each appropriate data connector server in connection with each request for data access service. The identification information provided by the individual is verified against the identity information relating to the individual contained within the at least one data source. Next, a response indicating whether the identity of the individual has been authenticated or not is generated and communicated to the customer system. A system for implementing such an identity verification method is also described. |