OA19648A - Systems and methods for providing block chain-based multifactor personal identity verification. - Google Patents

Systems and methods for providing block chain-based multifactor personal identity verification. Download PDF

Info

Publication number
OA19648A
OA19648A OA1201800379 OA19648A OA 19648 A OA19648 A OA 19648A OA 1201800379 OA1201800379 OA 1201800379 OA 19648 A OA19648 A OA 19648A
Authority
OA
OAPI
Prior art keywords
vérification
individual
unique data
block chain
address
Prior art date
Application number
OA1201800379
Inventor
Marcus Andrade
Original Assignee
Black Gold Coin, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Black Gold Coin, Inc. filed Critical Black Gold Coin, Inc.
Publication of OA19648A publication Critical patent/OA19648A/en

Links

Abstract

Block chain-based multifactor personal identity vérification may be provided. Verification addresses may be established on a block chain by: associating identifiers with individuals having previously verified personal identities, assigning verification addresses on a block chain to the individuals, and recording identifiers and biometric data associated with the individuals at corresponding verification addresses. Block chain-based multifactor personal identity verification using the verification addresses may be performed by: receiving one or more identifiers in connection with one or more requests to verify an identity of one or more individuals, extracting the biometric data associated with the one or more individuals from the corresponding verification addresses, and verifying the identity of the one or more individuals upon receiving matching biometric data and private keys.

Description

SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTIFACTOR PERSONAL IDENTITY VERIFICATION
FIELD OF THE DISCLOSURE
This disclosure relates to Systems and methods for providing block chainbased multifactor Personal identity vérification.
SUMMARY
One aspect of the disclosure relates to a System for providing block chainbased multifactor personal identity vérification. The System may include one or more hardware processors configured by machine-readable instructions to establish vérification addresses on a block chain and/or perform block chain-based multifactor Personal identity vérification using the vérification addresses. Establishing vérification addresses on the block chain may include associating identifiers with individuals having previously verified personal identities, a first identifier being associated a first individual, the first individual having a previously verified personal identity; assigning vérification addresses on a block chain to the individuals, a given vérification address including a public key and a private key, a first vérification address being assigned to the first individual, the first vérification address including a first public key and a first private key; and recording identifiers and biométrie data associated with the individuals at corresponding vérification addresses, the first identifier and first biométrie data associated with the first individual being recorded at the first vérification address. Performing block chain-based multifactor personal identity vérification using the vérification addresses may include receiving one or more identifiers in connection with one or more requests to verify an identity of one or more individuals, the first identifier being received in connection with a request to verify an identity of the first individual; extracting the biométrie data associated with the one or more individuals from the corresponding vérification addresses, the first biométrie data associated with the first individual being extracted from the first vérification address; and verifying the identity of the one or more individuals upon receiving matching biométrie data and private keys, the Personal identity of the first individual being verified upon receipt of (1) biométrie data matching the first biométrie data and (2) a private key matching the first private key.
Another aspect of the disclosure relates to a method for establishing vérification addresses on a block chain in order to provide block chain-based multifactor personal identity vérification. The method may be performed by one or more hardware processors configured by machine-readable instructions. The method may include associating i identifiers with individuals having previously verified personal identities, a first identifier being associated a first individual, the first individual having a previously verified personal identity; assigning vérification addresses on a block chain to the individuals, a given vérification address including a public key and a private key, a first vérification address being assigned to the first individual, the first vérification address including a first public key and a first private key; and recording identifiers and biométrie data associated with the individuals at corresponding vérification addresses, the first identifier and first biométrie data associated with the first individual being recorded at the first vérification address. The identity of the one or more individuals may be vérifiable upon receiving matching biométrie data and private keys, such that the personal identity of the first individual is vérifiable upon receipt of (1 ) biométrie data matching the first biométrie data and (2) a private key matching the first private key.
Yet another aspect of the disclosure relates to a method for perform block chainbased multifactor personal identity vérification using vérification addresses. The method may be performed by one or more hardware processors configured by machine-readable instructions. The method may include receiving one or more identifiers in connection with one or more requests to verify an identity of one or more individuals, a first identifier being received in connection with a request to verify an identity of a first individual; extracting biométrie data associated with the one or more individuals from corresponding vérification addresses on a block chain, a given vérification address including a public key and a private key, first biométrie data associated with the first individual being extracted from a first vérification address assigned to the first individual, the first vérification address including a first public key and a first private key; and verifying the identity of the one or more individuals upon receiving matching biométrie data and private keys, the personal identity of the first individual being verified upon receipt of (1) biométrie data matching the first biométrie data and (2) a private key matching the first private key.
These and other features, and characteristics of the présent technology, as well as the methods of operation and functions of the related éléments of structure and the combination of parts and économies of manufacture, will become more apparent upon considération of the following description and the appended daims with reference to the accompanying drawings, ail of which form a part of this spécification, wherein like reference numerals designate corresponding parts in the various figures. It is to be expressly understood, however, that the drawings are for the purpose of illustration and description only and are not intended as a définition of the limits of the invention. As used in the spécification and in the daims, the singular form of a, an, and the include plural referents unless the context clearly dictâtes otherwise.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrâtes a System for providing block chain-based multifactor Personal identity vérification, in accordance with one or more implémentations.
FIG. 2 illustrâtes a method for establishing vérification addresses on a block chain in order to provide block chain-based multifactor personal identity vérification, in accordance with one or more implémentations.
FIG. 3 illustrâtes a method for performing block chain-based multifactor personal identity vérification using vérification addresses, in accordance with one or more implémentations.
DETAILED DESCRIPTION
FIG. 1 illustrâtes a System 100 for providing block chain-based multifactor Personal identity vérification, in accordance with one or more implémentations. In some implémentations, System 100 may include one or more servers 102. The server(s) 102 may be configured to communicate with one or more computing platforms 104 according to a client/server architecture, a peer-to-peer architecture, and/or other architectures. The users may access System 100 via computing platform(s) 104.
The server(s) 102 may be configured to execute machine-readable instructions 106. The machine-readable instructions 106 may include one or more of an individual identifier component 108, a vérification address assignment component 110, an address recordation component 112, a user interface component 114, a vérification request component 116, an information extraction component 118, an identity vérification component 120, and/or other machine-readable instruction components.
The machine-readable instructions 106 may be exécutable to establish vérification addresses on a block chain. Generally speaking, a block chain is a transaction database shared by some or ail nodes participating in System 100. Such participation may be based on the Bitcoin protocol, Ethereum protocol, and/or other protocols related to digital currencies and/or block chains. A full copy of the block chain contains every transaction ever executed in an associated digital currency. In addition to transactions, other information may be contained by the block chain, such as described further herein.
The block chain may be based on several blocks. A block may include a record that contains and confirms one or more waiting transactions. Periodically (e.g., roughly every one minute), a new blockÿicluding transactions and/or other information may be appended to the block chain. In some implémentations, a given block in the block chain contains a hash of the previous block. This may hâve the effect of creating a chain of blocks from a genesis block (i.e., the first block in the block chain) to a current block. The given block may be guaranteed to corne chronologically after a previous block because the previous block's hash would otherwise not be known. The given block may be computationally impractical to modify once it is included in the block chain because every block after it would also hâve to be regenerated.
A given vérification address may include a spécifie location on the block chain where certain information is stored. In some implémentations, an individual vérification address may be referred to as an AtenVerify Address. Vérification addresses are further described below in connection with vérification address assignment component 110.
The individual identifier component 108 may be configured to associated identifiers with individuals having previously verified personal identities. For example, a first identifier may be associated a first individual. The first individual may hâve a previously verified personal identity. Generally speaking, an identifier may include one or more of a number, an alphanumeric code, a username, and/or other information that can be linked to an individual. In some implémentations, an individual identifier may be referred to as an Aten ID.
In accordance with some implémentations, an individual having a previously verified personal identity may hâve obtained the previously verified personal identity through a variety of approaches. For example, in some implémentations the individual may be required to provide evidence of the individual's identity. Such evidence may include one or more of providing a copy of a govemment issued identification (e.g., passport and/or driver's license), providing a copy of mail received by the individual (e.g., a utility bill), evidence provided by a third party, and/or other evidence on an individual's identity. The evidence may be provided to an entity associated with server(s) 102.
The vérification address assignment component 110 may be configured to assign vérification addresses on a block chain to the individuals. A given vérification address may include a public key and a private key. By way of example, a first vérification address may be assigned to the first individual. The first vérification address may include a first public key and a first private key.
Generally speaking, a public and private key-pair may be used for encryption and decryption according to one or more public key algorithms. By way of non- limiting example, a key pair may be used for digital signatures. Such a key pair may include a private key for signing and a public key for vérification. The public key may be widely distributed, while the private key is kept secret (e.g., known only to its proprietor). The keys may be related mathematically, but calculating the private key from the public key is unfeasible.
In some implémentations, vérification address assignment component 110 may be configured such that private keys may be stored within computing platform(s) 104. For example, the first private key may be stored within a computing platform 104 and/or other locations associated with the first individual. In accordance with some implémentation, a private key may be stored in one or more of a verify.dat file, a SIM card, and/or other locations.
In some implémentations, vérification address assignment component 110 may be configured such that multiple vérification addresses may be assigned to separate individuals. For example, in addition to the first vérification address, a second vérification address may be assigned to the first individual. One or more additional vérification addresses may be assigned to the first individual, in accordance with one or more implémentations.
The address recordation component 112 may be configured to record identifiers and biométrie data associated with the individuals at corresponding vérification addresses. For example, the first identifier and first biométrie data associated with the first individual may be recorded at the first vérification address. Recording information at a given vérification address may include recording a hash or other encrypted représentation of the information. In some implémentations, different biométrie data may be recorded at multiple vérification addresses assigned to a single given individual. For example, in addition to the first identifier and the first biométrie data associated with the first individual being recorded at the first vérification address, the first identifier and second biométrie data associated with the first individual may be recorded at a second vérification address.
Generally speaking, biométrie data may include metrics related to human characteristics. Biométrie identifiers are distinctive, measurable characteristics that can be used to label and describe individuals. Biométrie identifiers are typically include physiological characteristics, but may also include behavioral characteristics and/or other characteristics. Physiological characteristics may be related to the shape of an individual's body. Examples of physiological characteristics used as biométrie data may include one or more of fingerprint, palm veins, face récognition, DNA, palm print, hand geometry, iris récognition, retina, odor or scent, and/or other physiological characteristics. Behavioral characteristics may be related to a pattern of behavior of an individual. Examples of behavioral characteristics used as biométrie data may include one or more of typing rhythm, gait, voice, and/or other behavioral characteristics.
The biométrie data may include one or more of an image or other Visual représentation of a physiological characteristic, a recording of a behavioral characteristic, a template of a physiological characteristic and/or behavioral characteristic, and/or other biométrie data. A template may include a synthesis of relevant features extracted from the source. A template may include one or more of a vector describing features of a physiological characteristic and/or behavioral characteristic, a numerical représentation of a physiological characteristic and/or behavioral characteristic, an image with particular properties, and/or other information.
Biométrie data may be received via computing platforms 104 associated with the individuals. For example, biométrie data associated with a first individual may be received via a first computing platform 104 associated with the first individual. The first computing platform 104 may include an input device (not depicted) configured to capture and/or record a physiological characteristic and/or behavioral characteristic of the first individual. Examples of such an input device may include one or more of a caméra and/or other imaging device, a fingerprint scanner, a microphone, an accelerometer, and/or other input devices.
The user interface component 114 may be configured to provide an interface for présentation to individuals via associated computing platforms 104. The interface may include a graphical user interface presented via individual computing platforms 104. According to some implémentations, the interface may be configured to allow a given individual to add or delete vérification addresses assigned to the given individual so long as at least one vérification address is assigned to the given individual.
In some implémentations, user interface component 114 may be configured to access and/or manage one or more user profiles and/or user information associated with users of System 100. The one or more user profiles and/or user information may include information stored by server(s) 102, one or more of the computing platform(s) 104, and/or other storage locations. The user profiles may include, for example, information identifying users (e.g., a username or handle, a number, an identifier, and/or other identifying information), security login information (e.g., a login code or password), System account information, subscription information, digital currency account information (e.g., related to currency held in crédit for a user), relationship information (e.g., information related to relationships between users in System 100), System usage information, démographie information associated with users, interaction history among users in the System 100, information stated by users, purchase information of users, browsing history of users, a computing platform identification associated with a user, a phone number associated with a user, and/or other information related to users.
The machine-readable instructions 106 may be exécutable to perform block 5 chain-based multifactor personal identity vérification using the vérification addresses.
The vérification request component 116 may be configured to receive one or more identifiers in connection with one or more requests to verify an identity of one or more individuals. For example, the first identifier may be received in connection with a request to verify an identity of the first individual. Requests for identity vérification may 10 be provided in connection with and/or related to financial transactions, information exchanges, and/or other interactions. Requests may be received from other individuals and/or other third parties.
The information extraction component 118 may be configured to extract the biométrie data associated with the one or more individuals from the corresponding 15 vérification addresses. For example, the first biométrie data associated with the first individual may be extracted from the first vérification address. Extracting information (e.g., biométrie data) from a vérification address may include decrypting information.
According to some implémentations, information extraction component 118 may
individual may be verified upon receipt of (1) biométrie data matching the first biométrie data and (2) a private key matching the first private key. Verifying the personal identity of the first individual may include comparing stored information with newly received information.
According to some implémentations, identity vérification component 120 may be configured such that the personal identity of the first individual may be verified upon receipt of (1) biométrie data matching the first biométrie data or the second biométrie data and (2) a private key matching the first private key. Such implémentations may provide so-called M-of-N signatures for identity vérification where some subset of a larger set of identifying information is required.
In some implémentations, identity vérification component 120 may be configured such that the biométrie data matching the first biométrie data and the private key matching the first private key may be used to sign the vérification of the personal identity of the first individual.
A cryptographie signature is a mathematical mechanism that allows someone to prove ownership. In the case of Bitcoin, a Bitcoin wallet and its private key(s) are linked by some mathematical magic. When your Bitcoin software signs a transaction with the appropriate private key, the whole network can see that the signature matches the bitcoins being spent. However, there is no way for the world to guess your private key to steal your hard-earned bitcoins.
In some implémentations, at least one dedicated node performs the signing of the vérification of the personal identity of the first individual. A given dedicated node may include one or more of the server(s) 102. The given dedicated node may be a public node or a private node configured for creating new blocks and/or for signing vérification.
In some implémentations, server(s) 102, computing platform(s) 104, and/or external resources 122 may be operatively linked via one or more electronic communication links. For example, such electronic communication links may be established, at least in part, via a network such as the Internet and/or other networks. It will be appreciated that this is not intended to be limiting, and that the scope of this disclosure includes implémentations in which server(s) 102, computing platform(s) 104, and/or external resources 122 may be operatively linked via some other communication media.
A given computing platform 104 may include one or more processors configured to execute machine-readable instructions. The machine-readable instructions may be configured to enable an expert or user associated with the given computing platform 8
104 to interface with System 100 and/or external resources 122, and/or provide other functionality attributed herein to computing platform(s) 104. By way of non-limiting example, the given computing platform 104 may include one or more of a desktop computer, a laptop computer, a handheld computer, a tablet computing platform, a NetBook, a Smartphone, a gaming console, and/or other computing platforms.
External resources 122 may include sources of information, hosts and/or providers of Virtual environments outside of System 100, external entities participating with System 100, and/or other resources. In some implémentations, some or ail of the functionality attributed herein to external resources 100 may be provided by resources included in System 100.
Server(s) 102 may include electronic storage 124, one or more processors 126, and/or other components. Server(s) 102 may include communication lines, or ports to enable the exchange of information with a network and/or other computing platforms. Illustration of server(s) 102 in FIG. 1 is not intended to be limiting. Server(s) 102 may include a plurality of hardware, software, and/or firmware components operating together to provide the functionality attributed herein to server(s) 102. For example, server(s) 102 may be implemented by a cloud of computing platforms operating together as server(s) 102.
Electronic storage 124 may comprise non-transitory storage media that electronically stores information. The electronic storage media of electronic storage 124 may include one or both of System storage that is provided integrally (i.e., substantially non-removable) with server(s) 102 and/or removable storage that is removably connectable to server(s) 102 via, for example, a port (e.g., a USB port, a firewire port, etc.) or a drive (e.g., a disk drive, etc.). Electronic storage 124 may include one or more of optically readable storage media (e.g., optical disks, etc.), magnetically readable storage media (e.g., magnetic tape, magnetic hard drive, floppy drive, etc.), electrical charge-based storage media (e.g., EEPROM, RAM, etc.), solidstate storage media (e.g., flash drive, etc.), and/or other electronically readable storage media. Electronic storage 124 may include one or more Virtual storage resources (e.g., cloud storage, a Virtual private network, and/or other Virtual storage resources). Electronic storage 124 may store software algorithms, information determined by processor(s) 126, information received from server(s) 102, information received from computing platform(s) 104, and/or other information that enables server(s) 102 to function as described herein.
Processor(s) 126 may be configured to provide information Processing capabilities in server(s) 102. As such, processor(s) 126 may include one or more of a digital processor, an analog processor, a digital circuit designed to process information, an analog circuit designed to process information, a State machine, and/or other mechanisms for electronically processing information. Although processor(s) 126 is shown in FIG. 1 as a single entity, this is for illustrative purposes only. In some implémentations, processor(s) 126 may include a plurality of processing units. These Processing units may be physically located within the same device, or processor(s) 126 may represent processing functionality of a plurality of devices operating in coordination. The processor(s) 126 may be configured to execute machine-readable instruction components 108, 110, 112, 114, 116, 118, 120, and/or other machinereadable instruction components. Processor(s) 126 may be configured to execute machine-readable instruction components 108, 110, 112, 114, 116, 118, 120, and/or other machine-readable instruction components by software; hardware; firmware; some combination of software, hardware, and/or firmware; and/or other mechanisms for configuring processing capabilities on processor(s) 126. As used herein, the term machine-readable instruction component may refer to any component or set of components that perform the functionality attributed to the machine-readable instruction component. This may include one or more physical processors during execution of processor readable instructions, the processor readable instructions, circuitry, hardware, storage media, or any other components.
It should be appreciated that although machine-readable instruction components 108,110,112,114, 116,118, and 120 are illustrated in FIG. 1 as being implemented within a single processing unit, in implémentations in which processor(s) 126 includes multiple processing units, one or more of machinereadable instruction components 108, 110, 112, 114, 116, 118, and/or 120 may be implemented remotely from the other machine-readable instruction components. The description of the functionality provided by the different machine-readable instruction components 108,110,112,114,116,118, and/or 120 described below is for illustrative purposes, and is not intended to be limiting, as any of machinereadable instruction components 108, 110, 112, 114, 116, 118, and/or 120 may provide more or less functionality than is described. For example, one or more of machine-readable instruction components 108,110,112,114,116,118, and/or 120 may be eliminated, and some or ail of its functionality may be provided by other ones of machine-readable instruction components 108, 110, 112, 114, 116, 118, and/or 120. As another example, processor(s) 126 may be configured to execute one or more additional machine-readable instruction components that may perform some or ail of the functionality attributed below to one of machine-readable instruction components 108, 110, 112, 114, 116, 118, and/or 120.
FIG. 2 illustrâtes a method 200 for establishing vérification addresses on a block chain in order to provide block chain-based multifactor personal identity vérification, in accordance with one or more implémentations. The operations of method 200 presented below are intended to be illustrative. In some implémentations, method 200 may be accomplished with one or more additional operations not described, and/or without one or more of the operations discussed. Additionally, the order in which the operations of method 200 are illustrated in FIG. 2 and described below is not intended to be limiting.
In some implémentations, one or more operations of method 200 may be implemented in one or more processing devices (e.g., a digital processor, an analog processor, a digital circuit designed to process information, an analog circuit designed to process information, a State machine, and/or other mechanisms for electronically Processing information). The one or more processing devices may include one or more devices executing some or ail of the operations of method 200 in response to instructions stored electronically on an electronic storage medium. The one or more processing devices may include one or more devices configured through hardware, firmware, and/or software to be specifically designed for execution of one or more of the operations of method 200.
At an operation 202, identifiers may be associated with individuals having previously verified personal identities. A first identifier may be associated a first individual. The first individual may hâve a previously verified personal identity. Operation 202 may be performed by one or more hardware processors configured to execute a machine-readable instruction component that is the same as or similar to individual identifier component 108 (as described in connection with FIG. 1), in accordance with one or more implémentations.
At an operation 204, vérification addresses on a block chain may be assigned to the individuals. A given vérification address may include a public key and a private key. A first vérification address may be assigned to the first individual. The first vérification address may include a first public key and a first private key. Operation 204 may be performed by one or more hardware processors configured to execute a machine-readable instruction component that is the same as or similar to vérification address assignment component 110 (as described in connection with FIG. 1), in accordance with one or more implémentations.
At an operation 206, identifiers and biométrie data associated with the individuals may be recorded at corresponding vérification addresses. The first identifier and first biométrie data associated with the first individual may be recorded at the first vérification address. The identity of the one or more individuals may be vérifiable upon, or in response to, receiving matching biométrie data and private keys. The personal identity of the first individual may be vérifiable upon, or in response to, receipt of (1) biométrie data matching the first biométrie data and (2) a private key matching the first private key. Operation 206 may be performed byone or more hardware processors configured to execute a machine-readable instruction component that is the same as or similarto address recordation component 112 (as described in connection with FIG. 1 ), in accordance with one or more implémentations.
FIG. 3 illustrâtes a method 300 for performing block chain-based multifactor Personal identity vérification using vérification addresses, in accordance with one or more implémentations. The operations of method 300 presented below are intended to be illustrative. In some implémentations, method 300 may be accomplished with one or more additional operations not described, and/or without one or more of the operations discussed. Additionally, the order in which the operations of method 300 are illustrated in FIG. 3 and described below is not intended to be limiting.
In some implémentations, method 300 may be implemented in one or more Processing devices (e.g., a digital processor, an analog processor, a digital circuit designed to process information, an analog circuit designed to process information, a State machine, and/or other mechanisms for electronically Processing information). The one or more Processing devices may include one or more devices executing some or ail of the operations of method 300 in response to instructions stored electronically on an electronic storage medium. The one or more Processing devices may include one or more devices configured through hardware, firmware, and/or software to be specifically designed for execution of one or more of the operations of method 300.
At an operation 302, one or more identifiers may be received in connection with one or more requests to verify an identity of one or more individuals. Afirst identifier may be received in connection with a request to verify an identity of a first individual. Operation 302 may be performed by one or more hardware processors configured to execute a machine-readable instruction component that is the same as or similar to vérification request component 116 (as described in connection with FIG. 1), in accordance with one or more implémentations.
At an operation 304, biométrie data associated with the one or more individuals may be extracted from corresponding vérification addresses on a block chain. A given vérification address may include a public key and a private key. First biométrie data associated with the first individual may extracted from a first vérification address assigned to the first individual. The first vérification address may include a first public key and a first private key. Operation 304 may be performed by one or more hardware processors configured to execute a machine-readable instruction component that is the same as or similar to information extraction component 118 (as described in connection with FIG. 1), in accordance with one or more implémentations.
At an operation 306, the identity of the one or more individuals may be verified upon, or in response to, receiving matching biométrie data and private keys. The Personal identity of the first individual may be verified upon, or in response to, receipt of (1) biométrie data matching the first biométrie data and (2) a private key matching the first private key. Operation 306 may be performed by one or more hardware processors configured to execute a machine-readable instruction component that is the same as or similar to identity vérification component 120 (as described in connection with FIG. 1), in accordance with one or more implémentations.
Exemplary implémentations may facilitate storing personal data on the block chain. The personal data may be stored on the block chain in an encrypted way. A person may be identified at the block chain level with one or more of a private key, a finger print, a finger print hash, an eye retina, an eye retina hash, and/or other unique information. The data stored may include or relate to one or more of a passport, an identification card, extracted passport information, a driver's license, extracted driver's license information, finger print, eye retina, and/or other information. According to some implémentations, if some of the data is changed, a new record may be created for that person in the block chain. That is, ail changes are added as new records. The old record will always be stored on the block chain. Generally speaking, ail records on the block chain are stored forever and cannot be removed. More than one copy of the block chain will exist to ensure the records are not manipulated.
Exemplary implémentations may facilitate access to personal data. There may be multiple access levels for the personal data in the block chain. Access Controls may be grated on public/private key pairs levels. Examples of access levels may include one or more of Super Admin (full access to block chain), Authorities- country level (full readonly access), Authorities-state/local level (limited read-only access), Police and other services including Emergency (access to certain personal data by Finger Print/Eye retina of that person only), Participating Merchants (limited access), and/or other access levels.
Exemplary implémentations may facilita te vérification check. There may be multiple levels for how it is possible to check vérification. For example, some implémentations may ensure a person has a record at Company but no Personal data is provided. Some implémentations may ensure a person has a record at Company and get very basic personal information such as Full Name,
DOB, Gender, and/or other basic information. Some implémentations may ensure a person has a record at Company and get ail personal data.
Although the présent technology has been described in detail for the purpose of illustration based on what is currently considered to be the most practical and preferred implémentations, it is to be understood that such detail is solely for that purpose and that the technology is not limited to the disclosed implémentations, but, on the contrary, is intended to cover modifications and équivalent arrangements that are within the spirit and scope of the appended claims. For example, it is to be understood that the présent technology contemplâtes that, to the extent possible, one or more features of any implémentation can be combined with one or more features of any other implémentation.

Claims (82)

  1. What is claimed is:
    1. A System for providing block chain-based multifactor personal identity vérification, the System comprising:
    one or more hardware processors configured by machine-readable instructions to:
    (a) establish vérification addresses on a block chain by:
    (i) associating identifiers with individuals having previously verified Personal identities, a first identifier being associated with a first individual, the first individual having a first previously verified Personal identity;
    (ii) assigning vérification addresses on a block chain to the individuals having previously verified personal identities, a given vérification address including a public key and a private key, a first vérification address being assigned to the first individual, the first vérification address including a first public key and a first private key; and (iii) recording identifiers including unique data associated with the individuals at corresponding vérification addresses, the first identifier including the first unique data associated with the first individual being recorded at the first vérification address;
    (b) perform block chain-based multifactor personal identity vérification using the vérification addresses by:
    (i) receiving one or more identifiers in connection with one or more requests to verify an identity of one or more individuals, the first identifier being received in connection with a request to verify an identity of the first individual;
    (ii) obtaining the identifiers including the unique data associated with the one or more individuals from the corresponding vérification addresses, the first identifier including the unique data associated with the first individual being obtained from the first vérification address; and (iii) verifying the identity of the one or more individuals upon receiving matching identifiers with the unique data and receiving matching private keys, the personal identity of the fîrst individual, having the first previously verified identity, being verified upon receipt of an identifier with unique data matching the first identifier with the first unique data stored in association with the first vérification address and a private key matching the first private key.
  2. 2. The System of claim 1, wherein the one or more hardware processors are a 1 s o configured by machine-readable instructions such that verifying the personal identity of the first individual is performed by signing a vérification transaction on the block chain.
  3. 3. The System of claim 2, wherein the one or more hardware processors are also configured by machine-readable instructions such that the vérification transaction is signed by a public node or a private node.
  4. 4. The System of claim 1, wherein the one or more hardware processors are also configured by machine-readable instructions to:
    add or delete established vérification addresses on the block chain by providing an interface for présentation to individuals via associated computing platforms, the interface being configured to allow a given individual to add or delete vérification addresses assigned to the given individual so long as at least one vérification address is assigned to the given individual.
  5. 5. The System of claim 1, wherein the computer System is caused to: sign, using the private key from which the vérification address was derived, the vérification of the individuars identity responsive to the détermination that the identifier of the request including the unique data of the request match the first identifier including the first unique data.
  6. 6. The system of claim 5, wherein the computer System is caused to: store, at the one or more computer-readable storage media, the private key in association with the vérification address associated with the block chain;
    obtain, from the user device or devices, the private key in connection with the request to verify the individual's identity;
    obtain the first private key using the vérification address indicated in the request; and sign, using the private key, the vérification of the individual's identity responsive to a détermination that the identifier of the request including the unique data of the request, and the private key of the request match the stored first identifier including the stored first unique data, and the stored first private key.
  7. 7. The System of claim 6, wherein the private key is also stored on a client-side device, and wherein the client-side device is a user device of the individual.
  8. 8. The system of claim 1, wherein the unique data relates to biométrie information of the individual.
  9. 9. The System of claim 1, wherein the first unique data relates to first biométrie information of the first individual and is stored on the block chain at the first vérification address.
  10. 10. The System of claim 1, wherein the unique data is one of an image, a recording, or a template and/or biométrie information is related to a fmgerprint, palm veins, face récognition, DNA, palm print, hand geometry, iris récognition, retina, odor, gait, voice, a fmgerprint hash or an eye retina hash.
  11. 11. The System of claim 1, wherein the unique data relates to one of a passport, extracted passport information, an identification card, extracted identification card information, a driver’s license, and extracted driver’s license information.
  12. 12. The System of claim 10, wherein the unique data is stored on the block chain at the vérification address.
  13. 13. The System of claim 11, wherein the unique data is stored on the block chain at the vérification address.
  14. 14. The System of claim 1, wherein the computer system is caused to: provide a first user, different than the individual, access to data stored at the one or more computer-readable storage media in association with the vérification address associated with the block chain, the first user being provided access to the stored data based on vérification that the first user has a first private key, the first private key being different the private key from which the vérification address was derived; and denying a second user, different than the individual, access to the stored data based on vérification that the second user has a second private key.
  15. 15. The System of claim 1, wherein the unique data and the identifier are different from each other.
  16. 16. The system of claim 1, wherein the computer system includes a server-side computer.
  17. 17. The system of claim 1, wherein the computer system is caused to: assign another vérification address associated with the block chain to the individual;
    store, at the one or more computer-readable storage media, additional unique data of the individual in association with the other vérification address associated with the block chain, the additional unique data being information rclatcdTp biométrie data of the individual;
    obtain, from the client-side device, the additional unique data in connection with the request to verify the individual's identity, the request further indicating the other vérification address associated with the block chain;
    obtain the stored additional unique information using the other vérification address indicated in the request; and sign the vérification of the individual's identity responsive to a détermination that the identifier of the request, the unique data of the request, and the additional unique data of the request match the stored identifier, the stored unique data, and the stored additional unique data, wherein the additional unique data is different from the unique data.
  18. 18. The System of claim 17, wherein the server-side computer System is caused to: obtain, via a user interface, a user-initiated command to add the other vérification address as an address of the block chain for the individual; and assign the other vérification address associated with the block chain to the individual based on the user-initiated command.
  19. 19. The System of claim 17, wherein the computer System is caused to: obtain, via a user interface, a user-initiated command to remove the other vérification address as an address of the block chain for the individual; and de-associate the other vérification address associated with the block chain from the individual based on the user-initiated command.
  20. 20. The System of claim 1, wherein the computer System is caused to store the unique data in an encrypted form as a hash of information.
  21. 21. The System of claim 1, wherein the computer System is caused to store the unique data on the block chain in a block as a new transaction.
  22. 22. The System of claim 1, wherein the computer System is caused to store the unique data as a template or vector of information relating to the individual.
  23. 23. The system of claim 1, wherein the computer System is caused to enable a user to create a new record on the block chain containing changes to the unique data.
  24. 24. The system of claim 1, wherein the computer system is caused to, in verifying identity, require M-of-N signatures for identity vérification.
  25. 25. The System of claim 1, wherein the computer System is caused to provide access to personal data of the first individual whose identity is verified.
  26. 26. The System of claim 25, wherein the computer System is caused to enable multiple levels of access to the personal data of the first individual whose identity is verified.
  27. 27. The System of claim 25, wherein the computer System is caused to provide access to the personal data of the first individual whose identity is verified by a merchant.
  28. 28. A System for providing block chain-based personal identity vérification, the System comprising:
    one or more computer-readable storage media configured to store a block chain;
    a computer System comprising one or more processors programmed to execute computer program instructions that, when executed, cause the computer System to:
    assign a vérification address associated with the block chain to an individual, the individual having a previously verified personal identity;
    store, at the one or more computer-readable storage media, an identifier of the individual and unique data relating to the individual in association with the vérification address associated with the block chain, and wherein the unique data is related to biométrie data of the individual, and the vérification address is derived from private and public keys;
    obtain, from a client-side device, the identifier and unique data in connection with a request to verify the individual's identity, the request indicating the vérification address associated with the block chain;
    obtain the stored identifier and the stored unique data using the vérification address indicated in the request; and verify the individuafs identity responsive to a détermination that the identifier of the request and the unique data of the request match the stored identifier and the stored unique data.
  29. 29. The System of claim 28, wherein the one or more hardware processors are also configured by machine-readable instructions such that verifying the personal identity of the individual is performed by signing a vérification transaction on the block chain.
  30. 30. The System of claim 29, wherein the one or more hardware processors are also configured by machine-readable instructions such that the vérification transaction is signed by a public node or a private node.
  31. 31. The System of claim 28, wherein the one or more hardware processors are also configured by machine-readable instructions to:
    add or delete established vérification addresses on the block chain by providing an interface for présentation to individuals via associated computing platforms, the interface being configured to allow a given individual to add or delete vérification addresses assigned to the given individual so long as at least one vérification address is assigned to the given individual.
  32. 32. The System of claim 28, wherein the computer System is caused to: sign, using the private key from which the vérification address was derived, the vérification of the individuafs identity responsive to the détermination that the identifier of the request including the unique data of the request match the stored identifier and the stored unique data.
  33. 33. The System of claim 32, wherein the computer System is caused to: store, at the one or more computer-readable storage media, the private key in association with the vérification address associated with the block chain;
    obtain, from the user device or devices, the private key in connection with the request to verify the individual's identity;
    obtain the stored private key using the vérification address indicated in the request; and sign, using the private key, the vérification of the individuafs identity responsive to a détermination that the identifier of the request including the unique data of the request, and the private key of the request match the stored identifier including the stored unique data, and the stored private key.
  34. 34. The System of claim 33, wherein the private key is also stored on the client-side device, and wherein the client-side device is a user device of the individual.
  35. 35. The System of claim 28, wherein the unique data is biométrie information of the individual.
  36. 36. The System of claim 28, wherein the unique data is biométrie information of the individual and is stored on the block chain at the vérification address.
  37. 37. The System of claim 28, wherein the unique data is one of an image, a recording, or a template and/or biométrie information is related to a fmgerprint, palm veins, face récognition, DNA, palm print, hand geometry, iris récognition, retina, odor, gait, voice, a fmgerprint hash or an eye retina hash.
  38. 38. The System of claim 28, wherein the unique data relates to one of a passport, extracted passport information, an identification card, extracted identification card information, a driver’s license, and extracted driver’s license information.
  39. 39. The System of claim 37, wherein the unique data is stored on the block chain at the vérification address.
  40. 40. The System of claim 38, wherein the unique data is stored on the block chain at the vérification address.
  41. 41. The System of claim 28, wherein the computer System is caused to: provide a first user, different than the individual, access to data stored at the one or more computer-readable storage media in association with the vérification address associated with the block chain, the first user being provided access to the stored data based on vérification that the first user has a first private key, the first private key being different the private key from which the vérification address was derived; and denying a second user, different than the individual, access to the stored data based on vérification that the second user has a second private key.
  42. 42. The System of claim 28, wherein the unique data and the identifier are different from each other.
  43. 43. The System of claim 28, wherein the computer system includes a server-side computer.
  44. 44. The system of claim 28, wherein the computer system is caused to: assign another vérification address associated with the block chain to the individual;
    store, at the one or more computer-readable storage media, additional unique data of the individual in association with the other vérification address associated with the block chain, the additional unique data related to the individual;
    obtain, from the client-side device, the additional unique data in connection with the request to verify the individuafs identity, the request further indicating the other vérification address associated with the block chain;
    obtain the stored additional unique data using the other vérification address indicated in the request; and sign the vérification of the individuafs identity responsive to a détermination that the identifier of the request, the unique data of the request, and the additional unique data of the request match the stored identifier, the stored unique da^ and the stored additional unique data, wherein the additional unique data is different from the unique data.
  45. 45. The System of claim 44, wherein the server-side computer System is caused to: obtain, via a user interface, a user-initiated command to add the other vérification address as an address of the block chain for the individual; and assign the other vérification address associated with the block chain to the individual based on the user-initiated command.
  46. 46. The System of claim 44, wherein the computer System is caused to: obtain, via a user interface, a user-initiated command to remove the other vérification address as an address of the block chain for the individual; and de-associate the other vérification address associated with the block chain from the individual based on the user-initiated command.
  47. 47. The System of claim 28, wherein the computer System is caused to store the unique data in an encrypted form as a hash of information.
  48. 48. The System of claim 28, wherein the computer System is caused to store the unique data on the block chain in a block as a new transaction.
  49. 49. The system of claim 28, wherein the computer System is caused to store the unique data as a template or vector of information relating to the individual.
  50. 50. The system of claim 28, wherein the computer system is caused to enable a user to create a new record on the block chain containing changes to the unique data.
  51. 51. The system of claim 28, wherein the computer system is caused to, in verifying identity, require M-of-N signatures for identity vérification.
  52. 52. The system of claim 28, wherein the computer system is caused to provide access to Personal data of the individual whose identity is verified.
  53. 53. The system of claim 52, wherein the computer system is caused to enable multiple levels of access to the personal data of the individual whose identity is verified.
  54. 54. The system of claim 52, wherein the computer system is caused to provide access to the personal data of the individual whose identityÿs verified by a merchant.
  55. 55. A System for providing block chain-based multifactor personal identity vérification, the System comprising:
    one or more hardware processors configured by machine-readable instructions to:
    (a) establish vérification addresses on a block chain by:
    (i) associating identifiers with individuals having previously verified personal identities, a first identifier being associated with a first individual, the first individual having a first previously verified personal identity;
    (ii) assigning vérification addresses on a block chain to the individuals having previously verified personal identities, a given vérification address including a public key and a private key, a first vérification address being assigned to the first individual, the first vérification address including a first public key and a first private key; and (iii) recording identifiers and unique data associated with the individuals at corresponding vérification addresses, the first identifier and first unique data associated with the first individual being recorded at the first vérification address;
    (b) perform block chain-based multifactor personal identity vérification using the vérification addresses by:
    (i) receiving one or more identifiers in connection with one or more requests to verify an identity of one or more individuals, the first identifier being received in connection with a request to verify an identity of the first individual;
    (ii) obtaining the identifier including the unique data associated with the one or more individuals from the corresponding vérification addresses, the first identifier and the first unique data associated with the first individual being obtained from the first vérification address; and (iii) verifying the identity of the one or more individuals upon receiving matching identifiers and matching unique data and receiving matching private keys, the personal identity of the first individual, having the first previously verified identity, being verified upon receipt of an identifier and unique data matching the first identifier and the first unique data stored in association with the first vérification address and a private key matching the first private key.
  56. 56. The System of claim 55, wherein the unique data is biométrie data, and the first unique data is first biométrie data.
  57. 57. The System of claim 56, wherein the one or more hardware processors are also configured by machine-readable instructions such that verifying the personal identity of the first individual is performed by signing a vérification transaction on the block chain.
  58. 58. The System of claim 57, wherein the one or more hardware processors are also configured by machine-readable instructions such that the vérification transaction is signed by a public node or a private node.
  59. 59. The System of claim 56, wherein the one or more hardware processors are also configured by machine-readable instructions to:
    add or delete established vérification addresses on the block chain by providing an interface for présentation to individuals via associated computing platforms, the interface being configured to allow a given individual to add or delete vérification addresses assigned to the given individual so long as at least one vérification address is assigned to the given individual.
  60. 60. The System of claim 56, wherein the computer System is caused to: sign, using the private key from which the vérification address was derived, the vérification of the individual's identity responsive to the détermination that the identifier of the request including the unique data of the request match the first identifier and the fîrst unique data.
  61. 61. The System of claim 60, wherein the computer System is caused to: store, at the one or more computer-readable storage media, the private key in association with the vérification address associated with the block chain;
    obtain, from the user device or devices, the private key in connection with the request to verify the individual's identity;
    obtain the first private key using the vérification address indicated in the request; and sign, using the private key, the vérification of the individual's identity responsive to a détermination that the identifier of the request including the unique data of the request, and the private key of the request match the stored first identifier and the stored first unique data, and the stored first private key.
  62. 62. The System of claim 61, wherein the private key is also stored on a client-side device, and wherein the client-side device is a user device of the individual.
  63. 63. The System of claim 56, wherein the biométrie data comprises a biométrie hash.
  64. 64. The System of claim 56, wherein the first unique data relating to the biométrie data of the first individual and is stored on the block chain at the first vérification address.
  65. 65. The System of claim 56, wherein the unique data is one of an image, a recording, or a template and/or biométrie information is related to a fingerprint, palm veins, face récognition, DNA, palm print, hand geometry, iris récognition, retina, odor, gait, voice, a fingerprint hash or an eye retina hash.
  66. 66. The System of claim 56, wherein the unique data relates to one of a passport, extracted passport information, an identification card, extracted identification card information, a driver’s license, and extracted driver’s license information.
  67. 67. The System of claim 65, wherein the unique data is stored on the block chain at the vérification address.
  68. 68. The System of claim 66, wherein the unique data is stored on the block chain at the vérification address.
  69. 69. The System of claim 56, wherein the computer System is caused to: provide a first user, different than the individual, access to data stored at the one or more computer-readable storage media in association with the vérification address associated with the block chain, the first user being provided access to the stored data based on vérification that the first user has a first private key, the first private key being different the private key from which the vérification address was derived; and denying a second user, different than the individual, access to the stored data based on vérification that the second user has a second private key.
  70. 70. The System of claim 56, wherein the unique data and the identifier are different from each other.
  71. 71. The System of claim 56, wherein the computer System includes a server-side computer.
  72. 72. The System of claim 56, wherein the computer System is caused to: assign another vérification address associated with the block chain to the individual;
    store, at the one or more computer-readable storage media, additional unique data of the individual in association with the other vérification address associated with the block chain, the additional unique data being information related2t§ biométrie data of the individual;
    obtain, from the client-side device, the additional unique data in connection with the request to verify the individuars identity, the request further indicating the other vérification address associated with the block chain;
    obtain the stored additional unique information using the other vérification address indicated in the request; and sign the vérification of the individuars identity responsive to a détermination that the identifier of the request, the unique data of the request, and the additional unique data of the request match the stored identifier, the stored unique data, and the stored additional unique data, wherein the additional unique data is different from the unique data.
  73. 73. The system of claim 72, wherein the server-side computer system is caused to: obtain, via a user interface, a user-initiated command to add the other vérification address as an address of the block chain for the individual; and assign the other vérification address associated with the block chain to the individual based on the user-initiated command.
  74. 74. The system of claim 72, wherein the computer System is caused to: obtain, via a user interface, a user-initiated command to remove the other vérification address as an address of the block chain for the individual; and de-associate the other vérification address associated with the block chain from the individual based on the user-initiated command.
  75. 75. The system of claim 56, wherein the computer system is caused to store the unique data in an encrypted form as a hash of information.
  76. 76. The system of claim 56, wherein the computer system is caused to store the unique data on the block chain in a block as a new transaction.
  77. 77. The system of claim 56, wherein the computer system is caused to store the unique data as a template or vector of information relating to the individual.
  78. 78. The system of claim 56, wherein the computer system is caused to enable a user to create a new record on the block chain containing changes to the unique data.
  79. 79. The system of claim 56, wherein the computer system is caused to, in verifying identity, require M-of-N signatures for identity vérification.
  80. 80. The System of claim 56, wherein the computer System is caused to provide access to personal data of the first individual whose identity is verified.
  81. 81. The System of claim 80, wherein the computer System is caused to enable multiple 5 levels of access to the personal data of the first individual whose identity is verified.
  82. 82. The System of claim 80, wherein the computer System is caused to provide access to the personal data of the first individual whose identity is verified by a merchant.
OA1201800379 2016-03-28 2016-03-29 Systems and methods for providing block chain-based multifactor personal identity verification. OA19648A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US15/083,241 2016-03-28

Publications (1)

Publication Number Publication Date
OA19648A true OA19648A (en) 2020-12-31

Family

ID=

Similar Documents

Publication Publication Date Title
US10298571B2 (en) Systems and methods for providing block chain-based multifactor personal identity verification
AU2018100477A4 (en) Systems and methods for providing block chain-based multifactor personal identity verification
OA19648A (en) Systems and methods for providing block chain-based multifactor personal identity verification.
OA18670A (en) Systems and methods for providing block chain-based multifactor personal identity verification