Equifax Inc.
Secure online access control to prevent identification information misuse

Last updated:

Abstract:

In some aspects, a computing system can control access of a user computing device to a resource. The computing system can obtain an access request submitted by a user computing device. The computing system can verify permission information in the access request to determine that the access request is valid. If the access request is valid, the computing system submits an authentication request to request an authentication system to authenticate the user and obtains authentication results generated by the authentication system. The computing system further provides, based on the authentication results, an access control decision for the access request.

Status:
Grant
Type:

Utility

Filling date:

31 Dec 2019

Issue date:

7 Jun 2022