| CPC H04L 63/0861 (2013.01) [G06Q 50/265 (2013.01); H04L 9/0825 (2013.01); H04L 63/0442 (2013.01); H04L 63/0853 (2013.01); H04L 63/0884 (2013.01); H04W 12/06 (2013.01); G06Q 20/34 (2013.01); G06Q 20/4014 (2013.01); G06Q 20/40145 (2013.01); H04L 63/0815 (2013.01); H04W 12/65 (2021.01)] | 17 Claims |

|
1. A computer-implemented method for use in managing access to digital identities associated with mobile devices, the method comprising:
upon launching a mobile application installed at a mobile device, determining, by the mobile device, that identity data of a user stored in the mobile device is changed, relative to input data from the user since a prior login to the mobile application at the mobile device, the identity data including a government identification number, a mailing address, and at least one of an email address and/or a phone number of the user; and then,
in response to determining that the identity data is changed:
presenting, by the mobile device, at a presentation unit of the mobile device, the user with multiple third parties, separate from the mobile device, to authenticate the user, wherein the user is associated with an account at each of the third parties and login credentials for the accounts;
prompting, by the mobile device, the user to select from the multiple third parties to authenticate the user, whereby the user selects one of the multiple third parties;
requesting the selected one of the multiple third parties to authenticate the user;
causing an authentication interface associated with the selected one of the multiple third parties to be displayed at the mobile device, wherein the authentication interface solicits the login credentials for the account associated with the user at the selected one of the multiple third parties; and
granting, by the mobile device, access to one or more services and/or functions of the mobile application installed at the mobile device, in response to an indication of a successful authentication of the user from the selected one of the multiple third parties, thereby relying on the authentication of the user by the selected one of the multiple third parties in order to grant the access to the one or more services and/or functions of the mobile application installed at the mobile device.
|