WO2019209286A1 - Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features - Google Patents

Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features Download PDF

Info

Publication number
WO2019209286A1
WO2019209286A1 PCT/US2018/029350 US2018029350W WO2019209286A1 WO 2019209286 A1 WO2019209286 A1 WO 2019209286A1 US 2018029350 W US2018029350 W US 2018029350W WO 2019209286 A1 WO2019209286 A1 WO 2019209286A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
verified
documents
identification data
information
Prior art date
Application number
PCT/US2018/029350
Other languages
French (fr)
Inventor
Marcus Andrade
Original Assignee
Black Gold Coin, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US15/961,603 external-priority patent/US10484178B2/en
Application filed by Black Gold Coin, Inc. filed Critical Black Gold Coin, Inc.
Publication of WO2019209286A1 publication Critical patent/WO2019209286A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • This disclosure relates to systems and methods for providing verification of user Identity Information among business entities, and more particularly to providing a universal decentralized solution for verification of users with cross-verification features.
  • Some implementations according to the present technology are directed to software methods that improve computer functionality by Incorporating more robust security mechanisms Into the system. For example, It Is desirable to store Information associated with an Individual (user) In a secure fashion, Including but not limited to such customary and accepted forms of personal identification associated with one or more users such as an identification card, passport, or other documents; other user data belonging to the user; or other Information associated with the user. In some Implementations, It may be desirable for the user to have the capability to allow or deny an entity (e.g perhaps a business, Institution, etc,) the right to access that Information.
  • an entity e.g. a business, Institution, etc,
  • a user's biometric data and privacy will be well protected while sharing biometric data with the public and/or others through the medium of a trust utility such as a blockchaln (e.g., distributed ledger technology), a centralized ledger, or other trust utility organization,
  • a trust utility such as a blockchaln (e.g., distributed ledger technology), a centralized ledger, or other trust utility organization
  • the present disclosure* provides a system operative In real time and without human Intervention, to verify user identification information among two or more entities that Is related to the verified documents of a user.
  • the invention Includes enhanced methods of biometric security of via face, retina, iris, fingerprint, and applied encrypted images for generating a biometric authentication code.
  • the authentication code thus generated may then be applied or tagged directly to any data format that is utilized within a distributed ledger, such as in a blockchain-based system.
  • identification data associated with Individual users may be further enhanced by the use of geo-location and connection datasets.
  • a distributed ledger e.g., each firm Is able to perform a keyword lookup to identify the number of clients Firm A has under that criteria
  • biometric Identification verification tied directly to clients (e.g., from AML, KYC, and/or other documentation), wherein each firm knows for certainty that those clients' documents and digital identity qualified via biometric authentication are verifiable.
  • AML Arrtl- Money Laundering
  • KYC Know Your Customer
  • a method and associated dashboard are contemplated.
  • the system may include one or more physical (i.e., hardware) processors and/or other components.
  • the one or more physical processors may be configured by machlne- readable instructions to receive from a first entity, at a blockchain or trust utility, Information related to one or more verified first documents, the verified first documents associated with a first user.
  • the physical processors may be configured to receive from a second entity, at the blockchain or trust utility, a request for the Information related to the verified documents associated with the first user.
  • the physical processors may be configured to, upon receiving from the first user, at the blockchain or trust utility, an approval of the request tor the Information related to the verified documents associated with the first user, give access, by the blockchain or trust utility, to the second entity to obtain access to Information related to the verified documents associated with the first user,
  • the physical processors may be configured to, upon receiving from the first user, at the blockchain or trust utility, a denial of the request for the Information related to the verified documents associated with the first user, deny access, by the blockchain or trust utility, to the second entity to obtain access to Information related to the verified documents associated with the first user.
  • Another aspect of the disclosure may relate to a method for providing a universal decentralized solution for verification of users with cross-verification features, the method being performed by one or more physical processors configured by machine-readable instructions.
  • the method may include receiving from a first entity, at a blockchain or trust utility, Information related to verified first documents, the verified first documents associated with a first user.
  • the method may Include receiving from a second entity, at the blockchain or trust utility, a request for the information related to the verified documents associated with the first user.
  • the method may Include, upon receiving from the first user, at the blockchain or trust utility, an approval of the request for the Information related to the verified documents associated with the first user, giving access, by the blockchain or trust utility, to the second entity to obtain access to information related to the verified documents associated with the first user,
  • the method may include, upon receiving from the first user, at the blockchain or trust utility, a denial of the request for the Information related to the verified documents associated with the first user, denying access, by the blockchain or trust utility, to the second entity to obtain access to information related to the verified documents associated with the first user.
  • FIG. 1 illustrates a system for providing a universal decentralized solution for verification of users with cross-verification features, in accordance with one or more implementations.
  • FIG. 2 is a schematic showing how entities may communicate with a blockchaln or trust utility, In accordance with one or more implementations
  • FIG. 3 Illustrates an overview of a blockchaln or trust utility with geo-location, In accordance with one or more implementations.
  • FIG. 4 Illustrates an applied blockchaln overview, In accordance with one or more implementations.
  • FIG. 5 illustrates a method for providing a universal decentralized solution for verification of users with cross-verification features, In accordance with one or more implementations .
  • FIG. 6 Illustrates a process operational In each node of a cross verification trust utility for ensuring a secure verification address for one of a digital user Identifier or biometric identification data of a user; and
  • FIG. 7 illustrates a system for securing verified documents of a user held by a first entity and configured for responding to requests for access from a second entity upon authorization by the user.
  • the Invention described herein Is directed to systems and methods for the facilitation of transactions between entities by verification of user's Identity information [according to FINRA rules, for example] In association with user documents among such entities as individuals, businesses, Institutions, etc. and In particular such transactions that are performed through encrypted communications on line without needing a trusted third party.
  • the system and the methods disclosed herein can also facilitate the transfer of a wide variety of digital assets.
  • the transactions are executed by agreements (such as so-called smart contracts) that are self-executing because certain specified conditions required for execution are pre-authorized and agreed -to In advance, In the manner of an If - Then premise.
  • agreements such as so-called smart contracts
  • the pre-authorization requires the provision of the party's Identities based on Identity documents such as government-issued documents (driver's license, social security number, passport, etc.), biometric scan data (images, fingerprints, voice prints, etc.), user location data, accredited Investor profiles, or other trusted references.
  • Identity documents such as government-issued documents (driver's license, social security number, passport, etc.), biometric scan data (images, fingerprints, voice prints, etc.), user location data, accredited Investor profiles, or other trusted references.
  • the Identity documentation Is evaluated in comparison with stored identity Information through an algorithmic process to match the identity of a party to a transaction with stored Identity data for that party held by an entity Involved In the transaction to be executed.
  • the Identity Information held by an entity is that Identity Information submitted or obtained previously by the entity.
  • the Identity Information and the transaction ledger Information are stored and Immutable In a secure database such as a distributed or centralized ledger that provides a secure method for recording data.
  • the distributed ledger functions as a trusted utility for facilitating and memorializing the details of the transaction.
  • AML and KYC documents are useful user identification resources because they contain or are associated with high quality, trust-worthy identification data.
  • AML documents associate user Information such as passports, driver’s licenses, perhaps social security numbers with transaction data known to be factually true.
  • KYC documents Include user Information about financial transactions or assets useful In determining a user’s statue as an accredited Investor. Examples include bank statements, Insurance policies, mortgage loan documents, Investment account information, etc.
  • AML and KYC documents may also be effectively used for user Identification of assets digitally such as stocks and bonds.
  • One type of distributed ledger Is a linear biockchain wherein data related to transaction documents and the digital signatures of the parties to the transaction are stored In blocks of data.
  • the blocks of data are related through a process of sequentially hashing the blocks to form a chain.
  • the chain of blocks Is replicated on all nodes In a peer-to-peer network of participating entitles.
  • Non-linear distributed ledgers that employ directed acyclic graphs (DAG) include IOTA Tangle and Hedra Hashgraph. Such DAG-based systems have a topological ordering, such that a sequence has no directed cycles.
  • IPFS Interplanetary File System
  • IPFS Interplanetary File System
  • the biockchain may be a public, decentralized or permissionless system or a private, centralized or permiseloned system. Communication and access to both types may be secured by public/private keys.
  • Other types of distributed ledgers include Ethereum, Hyperledger Fabric, and R3 Corda, which differ primarily In the processes used to obtain consensus among the nodes as to the accuracy of the ledger.
  • Cross Verification refers to the secure exchange of requests and information between two or more entitles as a precondition to a transaction - such as croas- selling - by verifying at one entity Information sent to It from another entity.
  • the Information may be Identity information or documents, or It may be of data about the documents associated with the identity information.
  • An example of cross verify could be the comparison of identification Information from various 'trust" parties to determine which one Is reliable.
  • FIG. 1 Illustrates a system 100 for providing a universal decentralized solution for verification of users with cross-verification features, In accordance with one or more Implementations, In some Implementations, system 100 may Include one or more servers 102.
  • the server(s) 102 may be configured to communicate with one or more computing platforms 104 according to a client/server architecture, a peer-to-peer architecture, and/or other architectures.
  • the users may access system 100 via computing platform(s) 104 such as desktop, laptop or tablet computers, and game consoles, wireless communication devices (e.g., smartphones), and other computing platforms capable of storing and executing program Instructions,
  • the server(s) 102 may be configured to execute machine-readable Instructions 106.
  • the machine-readable Instructions 106 may Include one or more of a machine readable Instruction components such as a receiving verified documents component 108, a receiving Information request component 110, a receiving user decision component 112, an approval/denial component 114, and/or other machine-readable Instruction components,
  • the machine-readable instructions 106 may be executable to establish verification addresses on a distributed ledger or other trust utility.
  • a trust utility may be a transaction database shared by some or all nodes participating In system 100. In a trust utility the trust is built Into the structure of the transaction database due to the security mechanisms Incorporated within it. For example, once a transaction is deposited with the trust utility, that information becomes immutable ⁇ i.e.. It cannot be altered. The participation of the nodes may be based on the Bitcoin protocol, Ethereum protocol, and/or other protocols related to digital currencies, and/or distributed ledgers (or other trust utilities). With respect to a blockchain, a full copy of the blockchain contains every transaction ever executed in an associated digital currency, In addition to transactions, other Information may be contained by the blockchaln or trust utility, such aa described further herein.
  • a blockchaln example of a trust utility may be based on several blocks.
  • a block may include a record that contains and confirms one or more waiting transactions, Periodically (e.g,, roughly every one minute), a new block including transactions and/or other Information may be appended to the blockchaln,
  • a given block In the blockchaln contains a hash of the previous block. This may have the effect of creating a chain of blocks from a genesis block (i.e. , the first block In the blockchaln) to a current block.
  • the given block may be guaranteed to come chronologically after a previous block because the previous block's hash would otherwise not be known.
  • the given block may be computationally Impractical to modify once it is included In the blockchaln because every block after It would also have to be regenerated,
  • a given verification address may Include a specific location on the blockchaln, distributed ledger or trust utility where certain information is stored.
  • an Individual verification address within the blockchaln or trust utility may be referred to as an "DUID Address.”
  • a DUID may be a "digital unique identifier" or a "digital unique Identity”
  • the receiving verified documents component 108 may be configured to receive from a first entity, at a blockchaln or trust utility, Information related to one or more verified first documents.
  • the verified first documents may be those documents associated with a first user (individual).
  • the first entity may include of an Institution, business, company, and/or other entitles.
  • the blockchaln or trust utility of the present technology may differ from a standard blockchaln. It may differ
  • the present technology may utilize an Ethereum blockchaln (or any other type of blockchaln or trust utility not tied to any cryptocurrency)
  • the Ethereum blockchaln and/or Ethereum private blockchaln may be created to be suited for various things.
  • Ethereum Is used as a public blockchaln a fee to execute the transaction Is required before the transaction can proceed. This fee is called "gas.”
  • gas When Ethereum is used as a private blockchain the gas fee must be paid but can be generated by mining, which Is a burdensome process*
  • Some examples may include Integrating components related to biometric tagging and/or biometric encryption of documentation held within the blockchain. The use of datasets, while ensuring client/individual data privacy and adhering to rules for the global data processing directive Is envisioned.
  • the trust utility may be a closed loop trust utility private blockchain In some Implementations, In some Implementations, the closed loop trust utility private blockchain may be made country-specific, In some Implementations, due to data protection and information communication office rules In different countries, the trust utility or distributed ledger may not be operated as a decentralized model. Instead, the trust utility may be operated as a closed-loop or centralized model. One reason some implementations may be country-specific Is the scenario where a first country and/or business do not want confidential and/or secure Information to be shared or accessed by a second country and/or business. The trust utility may be enabled to have separate implementations for country-specific practices. It should be noted that the distributed ledger or trust utility may be operated as either a centralized model or a decentralized model, In various implementations,
  • the Information related to the verified documents associated with the first user may be encrypted with a first key and a second key.
  • the first key may be a server key (e.g., a private key) that is stored on a backend server.
  • the second key may be a client key that Is a hash of biometric data associated with the first user (e.g., a hash generated by providing the biometric data as Input to a one-way hashing algorithm).
  • the first and second keys may be applied to the blockchain Immutable ID for hyper-encryption of sensitive data formats and/or associated documentation.
  • Receiving Information request component 110 may be configured to receive from a second entity, at the blockchain or trust utility, a request for the Information related to the verified documents associated with the first user.
  • the second entity may include one or more of an Institution, business, company, and/or other entities.
  • Receiving user decision component 112 may be configured to receive a decision (to give access or deny access) from the first user regarding the request for the Information related to the verified documents associated with the first user at the blockchain or trust utility,
  • approval/denial component 114 may be configured to give or deny access to the first entity, if the request for the Information is approved by the first user, access may be given by the trust utility for the second entity to obtain access to the Information, Likewise, if the request for the information Is not approved by the first user, access may be denied by toe trust utility for the second entity to obtain access to the Information.
  • the trust utility holds and applies biometric authentication code validation against Information related to the verified documents associated with the first user.
  • the first user may be notified If information related to the verified documents associated with the first user Is accessed by authorities or others, System 100 may be configured to associate identifiers with individuals having previously verified personal identities. For example, a first identifier may be associated with a first Individual, The first individual may have a previously verified personal Identity. Generally speaking, an identifier may include one or more of a number, an alphanumeric code, a username, and/or other Information that can be linked to an Individual. In some Implementations, an Individual identifier may be referred to as DUID or digital unique ID,
  • an individual having a previously verified personal identity may have obtained the previously verified personal Identity through a variety of approaches and the Individual may be required to provide evidence of the individual's identity,
  • Such evidence may include one or more of providing a copy of a government Issued identification (e.g., passport and/or driver's license), providing a copy of mall received by the Individual (e.g perhaps a utility bill), evidence provided by a third party, and/or other evidence on an Individual's identity.
  • the evidence may be provided to an entity associated with server(s) 102.
  • System 100 may be configured to assign verification addresses on a trust utility to the Individuals.
  • a given verification address may generated based on a public key and/or a private key.
  • a first verification address may be assigned to the first individual.
  • the first verification address may be generated based on a first public key and/or a first private key,
  • a public and private key-pair may be used for encryption and decryption according to one or more public key algorithms.
  • a key pair may be used for digital signatures.
  • Such a key pair may Include a private key for signing and a public key for verification.
  • the public key may be widely distributed, while the private key Is kept secret (e g., known only to its proprietor).
  • the keys may be related mathematically, but calculating the private key from the public key Is unfeasible.
  • system 100 may be configured such that private keys may be stored within computing platform(s) 104,
  • the first private key may be stored within a computing platform 104 and/or other locations associated with the first individual.
  • a private key may be stored In one or more of a user's "verify, dat" file, a SIM card, and/or other locations.
  • system 100 may be configured such that multiple verification addresses may be assigned to separate individuals. For example, In addition to the first verification address, a second verification address may be assigned to the first individual. One or more additional verification addressee may be assigned to the first Individual, In accordance with one or more implementations,
  • System 100 may be configured to record Identifiers and biometric data associated with the Individuals at corresponding verification addresses.
  • the first Identifier and first biometric data associated with the first individual may be recorded at the first verification address.
  • Recording Information at a given verification address may Include recording a hash or other encrypted representation of the Information.
  • different biometric data may be recorded at multiple verification addresses assigned to a single given Individual.
  • the first identifier and second biometric data associated with the first individual may be recorded at a second verification address.
  • biometric data may Include metrics related to human characteristics.
  • Biometric Identifiers are distinctive, measurable characteristics that can be used to label and describe Individuals, Biometric Identifiers typically include physiological characteristics, but may also Include behavioral characteristics and/or other characteristics.
  • Physiological characteristics may be related to the shape of an individual's body. Examples of physiological characteristics used as biometric data may include one or more of fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, Iris recognition, retina, odor or scent, and/or other physiological characteristics.
  • Behavioral characteristics may be related to a pattern of behavior of an Individual. Examples of behavioral characteristics used as biometric data may include one or more of typing rhythm, gait, voice, and/or other behavioral characteristics.
  • Online user behavioral characteristics may include a cyber behavior profile to Identify a person's Identity,
  • the biometric data may Include one or more of an image or other visual representation of a physiological characteristic, a recording of a behavioral characteristic, a template of a physiological characteristic and/or behavioral characteristic, and/or other biometric data.
  • a template may Include a synthesis of relevant features extracted from the source.
  • a template may include one or more of a vector describing features of a physiological characteristic and/or behavioral characteristic, a numerical representation of a physiological characteristic and/or behavioral characteristic, an image with particular properties, and/or other Information.
  • Biometric data may be received via computing platforms 104 associated with the individuals.
  • biometric data associated with a first Individual may be received via a first computing platform 104 associated with the first Individual.
  • the first computing platform 104 may Include an Input device (not depicted) configured to capture and/or record a physiological characteristic and/or behavioral characteristic of the first individual. Examples of such an Input device may Include one or more of a camera and/or other Imaging device, a fingerprint scanner, a microphone, an accelerometer, and/or other Input devices,
  • System 100 may be configured to provide an Interface for presentation to individuals via associated computing platforms 104.
  • the interface may Include a graphical user Interface presented via individual computing platforms 104.
  • the Interface may be configured to allow a given Individual to add or delete verification addresses assigned to the given individual so long as st least one verification address Is assigned to the given Individual,
  • system 100 may be configured to access and/or manage one or more user profiles and/or user Information associated with users of system 100,
  • the user profiles and/or user Information may include information stored by server(s) 102, one or more of the computing platform(s) 104, and/or other storage locations.
  • the user profiles may includes for example, Information identifying users (e.g., a username or handle, a number, an Identifier, and/or other identifying Information), security login information (e.g., a login code or password), system account information, subscription information, digital currency account Information (e.g., related to currency held In credit for a user), relationship information (e.gova Information related to relationships between users In system 100), system usage Information, demographic information associated with users, Interaction history among users In system 100, Information stated by users, purchase information of users, browsing history of users, a computing platform Identification associated with a user, a phone number associated with a user, and/or other Information related to users.
  • Information identifying users e.g., a username or handle, a number, an Identifier, and/or other identifying Information
  • security login information e.g., a login code or password
  • system account information e.g., related to currency held In credit for a user
  • relationship information e.g., related to relationships between users In
  • the machine-readable Instructions 106 may be executable to perform blockchain- based multifactor personal identity verification using the verification addresses.
  • System 100 may be configured to receive one or more Identifiers in connection with one or more requests to verify an Identity of one or more Individuals.
  • the first identifier may be received in connection with a request to verify an Identity of the first Individual.
  • Requests for identity verification may be provided in connection with and/or related to financial transactions, Information exchanges, and/or other interactions. Requests may be received from other individuals and/or other third parties.
  • System 100 may be configured to extract the biometric data associated with the one or more individuals from the corresponding verification addresses.
  • the first biometric data associated with the first Individual may be extracted from the first verification address.
  • Extracting Information e.g., biometric data
  • decrypting information may be included.
  • system 100 may be configured such that, responsive to receiving the request to verify the Identity of the first individual, a prompt may be provided to the first individual for biometric data matching the first biometric data and a private key matching the first private key.
  • the prompt may be conveyed via a computing platform 104 associated with the first Individual.
  • the prompt may be conveyed via a graphical user interface and/or other ueer interface provided by the computing platform 104 associated with the first Individual.
  • the prompt may Indude an Indication that is one or more of visual, audible, haptic, and/or other indications.
  • system 100 may be configured such that, responsive to receiving the request to verify the Identity of the first Individual, a prompt may be provided to a computing platform 104 associated with the first Individual.
  • the prompt may cause the computing platform 104 to automatically provide, to server(s) 102, biometric data matching the first biometric data and/or a private key matching the first private key,
  • System 100 may be configured to verify the identity of the individuals upon, or In response to, receiving matching biometric data and private keys, For example, the personal Identity of the first Individual may be verified upon receipt of (1 ) biometric data matching the first biometric data and (2) a private key matching the first private key. Verifying the personal Identity of the first Individual may Include comparing stored information with newly received Information, According to some Implementations, Identity system 100 may be configured such that the personal identity of the first Individual may be verified upon receipt of (1) biometric data matching the first biometric data or the second biometric data and (2) a private key matching the first private key. Such Implementations may provide so- called "M-of-N" signatures for identity verification where some subset of a larger set of Identifying Information Is required.
  • system 100 may be configured such that the biometric data matching the first biometric data and the private key matching the first private key may be used to sign the verification of the personal Identity of the first Individual.
  • at least one dedicated node performs the signing of the verification of the personal Identity of the first Individual or user.
  • a given dedicated node may Include one or more of server(s) 102, The given dedicated node may be a public node or a private node configured for creating new blocks and/or for signing verification.
  • FIG. 2 is a schematic 200 showing how entities may communicate with a blockchain or trust utility 202, In accordance with one or more Implementations.
  • Blockchain or trust utility 202 may receive from a first entity 204, Information related to one or more verified first documents 206. the verified first documents 206 associated with a first user.
  • blockchain or trust utility 202 may receive from a second entity 206 a request for the Information related to the verified documents 206 associated with the first user.
  • One or more documents 206 may be encrypted using, for example, an entity key to provide unique access.
  • blockchain or trust utility 202 may receive a decision (approval or denial) from the first user, regarding the request for the information related to the verified documents associated with the first user.
  • system 100 may give (grant) or deny access to the first user. If the request for the Information Is approved by the first user, access may be given by blockchain or trust utility 202 for second entity 208 to obtain access to the Information, Likewise, if the request for the Information Is not approved by the first user, access may be denied by blockchaln or trust utility 202 for second entity 208 to obtain access to the Information.
  • FIG. 3 illustrates an overview 300 of blockchaln or trust utility 202 with geo-location
  • Location data may be any information about an Individual's current location, or about their movements in the past, which can be linked to them.
  • the typea of data collected and applicable may include: base station data Received Signal Strength Indicator (RSSI), Time Difference of Arrival (TDOA), and Angle Of Arrival (AO A), GPS data, WiFi Access points (including Medium Access Control (MAC) addresses via mobile or passive scanning); static geo-location, dynamic/ongoing geolocation, location-based services and/or service set IDs (SSIDs).
  • RSSI base station data Received Signal Strength Indicator
  • TDOA Time Difference of Arrival
  • AO A Angle Of Arrival
  • GPS data GPS data
  • WiFi Access points including Medium Access Control (MAC) addresses via mobile or passive scanning
  • MAC Medium Access Control
  • static geo-location dynamic/ongoing geolocation
  • location-based services and/or service set IDs SSIDs
  • KML keyhole markup language
  • a legal framework may be the data protection directive (95/46/EC). It may apply in cases where personal data la being processed as a result of the processing of location data.
  • the e-privacy directive (2002/56/EC, as revised by 2009/136/EC) applies to the processing of base station data by public electronic communication services and networks (teiecom operators).
  • blockchaln or trust utility 202 generically holds and applies biometric code validation against one or more of anti-money laundering (AML) documents, know your customer (KYC) documents, know your business (KYB) documents (such as formation documents, bank statements, annual reports, transaction Information, etc.), know your peraon/proceas (KYP) documents, extraneous documents linked to businesses and Individuals, various authentication credentials, and/or other items.
  • AML anti-money laundering
  • KYC know your customer
  • KYB business
  • KYP peraon/proceas
  • FIG. 4 illustrates an an example of a private, permlssloned blockchaln overview 400, In accordance with one or more Implementations.
  • a privacy permlssionlng administration layer for the blockchaln Is envisioned. It may be built on, for example, an Ethereum (public, permissionless) blockchaln. As shown, there may be a mechanism for the storage of files (e.g., biometric data, etc.). These items may be coupled with an application programming interface (API) and, Inter alia, a BigChalnDB, This may be coupled with, for example, a biometric app and a website, among other things.
  • API application programming interface
  • the trust utility may be built on any type of distributed ledger architecture.
  • servers) 102, computing platform(s) 104, and/or external resources 122 may be operatively linked via one or more electronic communication links.
  • electronic communication links may be established, at least In part, via a network such as the Internet and/or other networks, It will be appreciated that this is not Intended to be limiting, and that the scope of this disclosure Includes implementations in which server(s) 102, computing platform(s) 104, and/or external resources 122 may be operatively linked via some other communication media.
  • a given computing platform 104 may Include one or more processors configured to execute machine-readable Instructions.
  • the machine-readable Instructions may be configured to enable an expert or user associated with the given computing platform 104 to Interface with system 100 and/or external resources 122, and/or provide other functionality attributed herein to computing platform(s) 104.
  • the given computing platform 104 may Include one or more of a desktop computer, a laptop computer, a handheld computer, a tablet computing platform, a NetBook, a Smartphone, a gaming console, and/or other computing platforms.
  • Extemal resources 122 may Include sources of Information, hosts, and/or providers of virtual environments outside of system 100, external entities participating with system 100, and/or other resources. In some Implementations, some or all of the functionality attributed herein to external resources 100 may be provided by resources included In system 100.
  • Server(s) 102 may include electronic storage 124, one or more processors 126, and/or other components, Server(s) 102 may Include communication lines, or ports to enable the exchange of Information with a network and/or other computing platforms, Illustration of server(s) 102 in FIG. 1 Is not Intended to be limiting.
  • Server(s) 102 may include a plurality of hardware, software, and/or firmware components operating together to provide the functionality attributed herein to server(s) 102, For example, server(e) 102 may be implemented by a cloud of computing platforms operating together as server(e) 102.
  • Electronic storage 124 may comprise non-transltory storage media that electronically stores information.
  • the electronic storage media of electronic storage 124 may Include one or both of system storage that Is provided integrally (i.e., substantially non-removable) with servers) 102 and/or removable storage that Is removably connectable to server(s) 102 via, for example, a port (e.gance a USB port, a firewire port, etc.) or a drive (e.g., a disk drive, etc.),
  • Electronic storage 124 may include one or more of optically readable storage media (e.g., optical disks, etc.), magnetically readable storage media (e.g., magnetic tape, magnetic hard drive, floppy drive, etc.), electrical charge-based storage media (e.g., EEPROM, RAM, etc.), solid-state storage media (e.g., flash drive, etc.), and/or other electronically readable storage media.
  • Electronic storage 124 may Include one or more virtual storage resources (e.g., cloud
  • Electronic storage 124 may store software algorithms, Information determined by processor(s) 126, information received from servers) 102, Information received from computing platform(s) 104, and/or other Information that enables servers) 102 to function as described herein.
  • Processor ⁇ ) 126 may be configured to provide Information processing capabilities in server(s) 102.
  • processor(s) 126 may include one or more of a digital processor, an analog processor, a digital circuit designed to process Information, an analog circuit designed to process Information, a state machine, and/or other mechanisms for electronically processing Information, Although processor(s) 126 Is shown In FIG. 1 as a single entity, this Is for Illustrative purposes only. In some Implementations, proceasor(s) 126 may include a plurality of processing units.
  • processor(s) 126 may represent processing functionality of a plurality of devices operating In coordination.
  • Processor(s) 126 may be configured to execute machine- readable Instruction components 108, 110, 112, 114, and/or other machine-readable Instruction components.
  • Processors) 126 may be configured to execute machine- readable Instruction components 108, 110, 1 12, 114, and/or other machine-readable Instruction components by software; hardware; firmware; some combination of software, hardware, and/or firmware; and/or other mechanisms for configuring processing capabilities on processor(s) 126,
  • machine- readable instruction component may refer to any component or set of components that perform the functionality attributed to the machine-readable Instruction component, This may Include one or more physical processors during execution of processor readable instructions, the processor readable Instructions, circuitry, hardware, storage media, or any other components. It should be appreciated that although machine-readable Instruction components 108, 110, 112, 114 are illuatrated In FIG.
  • processor(s) 126 includes multiple processing units, one or more of machine-readable instruction components 108, 110, 112, and/or 114 may be Implemented remotely from the other machine-readable Instruction components.
  • the description of the functionality provided by the different machine-readable Instruction components 108, 110, 112, and/or 14 described below Is for Illustrative purposes, and Is not Intended to be limiting, as any of machine- readable Instruction components 106, 110, 1 12, and/or 114 may provide more or less functionality than Is described.
  • machine-readable Instruction components 108, 110, 1 12, and/or 114 may be eliminated, and some or all of Its functionality may be provided by other ones of machine-readable instruction components 108, 110, 112, and/or 114.
  • processor(s) 126 may be configured to execute one or more additional machine-readable Instruction components that may perform some or all of the functionality attributed below to one of machine-readable instruction components 108, 1 10, 112, and/or 114.
  • FIG, 6 illustrates a method 500 for providing a universal decentralized solution for verification of users with cross-verification features, In accordance with one or more Implementations.
  • the operations of method 500 presented below are Intended to be illustrative. In some implementations, method 500 may be accomplished with one or more additional operations not described, and/or without one or more of the operations discussed. Additionally, the order In which the operations of method 600 are Illustrated In FIG. 5 and described below Is not Intended to be limiting.
  • one or more operations of method 500 may be Implemented In one or more processing devices (e.g., a digital processor, an analog processor, a digital circuit designed to process information, an analog circuit designed to process Information, a state machine, and/or other mechanisms for electronically processing information).
  • the one or more processing devices may Include one or more devices executing some or all of the operations of method 500 In response to instructions stored electronically on an electronic storage medium.
  • the one or more processing devices may Include one or more devices configured through hardware, firmware, and/or software to be specifically designed for execution of one or more of the operations of method 600,
  • method 600 may Include receiving Information related to one or more verified first documents 206.
  • the verified first documents may be received at a blockchain or trust utility from a first entity (e.g., first entity 204).
  • the verified first documents 206 may be associated with a first user.
  • Operation 502 may be performed by one or more physical processors configured to execute a machine-readable Instruction component that Is the same as or similar to receiving verified documents component 108 (as described In connection with FIG. 1), In accordance with one or more implementations.
  • method 500 may Include receiving a request for the Information related to the verified documents (e.g., associated with the first user).
  • the request may be received at the blockchain or trust utility from a second entity (e.g., second entity 206).
  • Operation 504 may be performed by one or more physical processors configured to execute a machine-readable instruction component that is the same as or similar to receiving Information request component 110 (as described In connection with FIG. 1), In accordance with one or more Implementations.
  • method 500 may Include receiving a user decision (e.g., approval, denial, etc.).
  • the user decision may be received at the blockohain or trust utility from the first user.
  • the user decision may be with regard to the request for access to the verified documents associated with the first user or the Information related to the associated verified documents.
  • Operation 506 may be performed by one or more physical processors configured to execute a machine-readable Instruction component that Is the same as or similar to receiving user decision component 112 (as described In connection with FIG. 1), in accordance with one or more Implementations.
  • method 500 may Include giving or denying access to second entity 208. If the request for the Information Is approved by the first user, access may be given by blockchaln or trust utility 202 for second entity 208 to obtain access to the Information. Likewise, If the request for the Information Is not approved by the first user, access may be denied by the blockchaln or trust utility for second entity 208 to obtain access to the Information. Operation 508 may be performed by one or more physical processors configured to execute a machine-readable Instruction component that Is the same as or similar to approval/denial component 114 (as described in connection with FIG. 1), In accordance with one or more implementations.
  • Exemplary Implementations may facilitate storing personal data on the blockchaln.
  • the personal data may be stored on the blockchaln In an encrypted way.
  • a person may be identified at the blockchaln level with one or more of a private key, a finger print, a finger print hash, an eye retina, an eye retina hash, and/or other unique information.
  • the data stored may Include or relate to one or more of a passport, an identification card, extracted passport Information, a driver's license, extracted driver's license Information, finger print, eye retina, and/or other Information.
  • a new record may be created for that person In the blockchaln. That Is, all changes are added as new records, The old record will always be stored on the blockchaln.
  • exemplary implementations may facilitate access to personal data.
  • Super Admin full access to the distributed ledger, database or blockchaln
  • Authorlties-country level full read-only access
  • Authorlties- state/local level limited read-only access
  • police and other services Including Emergency (access to certain personal data by Finger Print/Eye retina of that person only), Participating Merchants (limited access), and/or other access levels.
  • Exemplary implementations may facilitate verification check. There may be multiple levels for how It Is possible to check verification. For example, some Implementations may ensure a person has a record at "Company" but no personal data Is provided. Some Implementations may ensure a person has a record at Company and get very basic personal information such as Full Name, DOB, Gender, and/or other basic Information. Some Implementations may ensure a person has a record at Company and get all personal data.
  • the technology may relate to using the PAS 1192*5 standard to manage construction Information and keep Information related to architecture and building construction and Infrastructure security, PAS (Publicly Available Specification) 1192-5 Is a standard published by the British Standards Organization for security-minded building Information modeling (BIM) and smart asset management.
  • BIM building Information modeling
  • These aspects may be related to relation to smart Cities, connected cities, connected houses, smart grids (e.g. energy, etc,), and/or the like.
  • Theee aspects may relate to the underlying security for Internet of Things (loT) for smart devices interconnecting but at a construction, architectural, and/or grid based level
  • AS 1192-5:2016 is the specification for security-minded building Information modelling, digital built environments and smart asset management
  • PAS 1192-5 specifies the processes that may assist organizations In Identifying and Implementing appropriate and proportionate measures to reduce the risk of loss or disclosure of Information that could Impact on the safety and security of: personnel and other occupants or users of the built asset and Its services; the built asset Itself; asset information; and/or the benefits the built asset exists to deliver,
  • PAS has been developed to Integrate a security-minded approach Into the construction lifecycle processes as specified In PAS 1192-2 and the asset management processes described In PAS 1192-3,
  • PAS may be specifically applied to the built asset, which may be a single building, e site or campus, and/or a portfolio or network of assets, These aspects may be related to the mobile data that can be processed, collated, and/or held within the distributed ledger (whether in regards to the biometric Identity of an individual and/or client),
  • the system of the present Invention fulfills two primary functions: (1) the addition of data to the platform regarding entities to enable the cross-sharing of information among them, the Information to Include Information about trusted entitles, user ID Information from various sources, and files of biometric ID data about users; and (2) the response to an inquiry or request from one entity to another to initiate cross-verification of data,
  • an administrative company adds Company A and to Company B to the platform (e.g combat system 100) ao that both companies can perform ID verifications and participate In the cross sharing of user data between companies
  • a company may include a bank, Insurance company, financial Industry, mobile Industry, government industry, public industry, or any type of other entities that are considered trusted companies
  • the trusted companies may include ATM (automated teller machine) companies and terminals.
  • a trust company may Include a company or Individual that Is regulated by any form of a government entity.
  • a company may add data of a user to Its database.
  • the user data may Include the user's private data, for example the user's Identification card, driver's license, passport, utility bill, and or other documents that states proof of Identification and address (e.g., AML-based (Anti-Money Laundering) or KYC-based (Know Your Customer) documents).
  • the user data may additionally or alternatively Include Insurance documents, financial documents, medical records, or other document or personal data that belongs to the user.
  • Such user data may further Include the user’s biometric data (e.g., recognition data for the user's face, retina/lrla, fingerprint, heartbeat, vein, voice, etc.).
  • biometric data e.g., recognition data for the user's face, retina/lrla, fingerprint, heartbeat, vein, voice, etc.
  • the user or the trusted company can then create a user authorization code.
  • a company may obtain the user's biometric data or other private self-identifying data In a number of ways (e.g., In-person by a trusted company representative or government agency or in other manners).
  • Biometric data may also be captured using a mobile application (e.g., via the hosting user device’s camera or other sensor) or with an external biometric capturing device that can be attached to a user device or other computing device, in some cases, a biometrics ATM may be used, In some cases, the biometric data may be confirmed without the user being present in the presence of a trusted party.
  • a QR Code (e.g., linking to the biometric data) may be transmitted (e.g., via email, text messaging, etc.) to the user to confirm that the biometric data belongs to the user, Other means of ID verification may additionally or alternatively be used.
  • P2PRV person to person registration verification
  • P2PRV may be utilized to provide ID verification.
  • P2PRV may Include Person A verifying the documentation and registering Person B, where Person A has already been registered by a trusted company.
  • Person A may verity Person B's documentation (e.g., by comparing Person B to his/her photo In Person B's documentation, asking Person B verification questions related to the documentation, etc.) and confirm that Person B Is actually the one completing the biometric scan. Person A may enter the confirmation into the verification system.
  • Company B (e.g., a secondary entity requesting user data of a user) may request from Company A (e.g,, a primary entity that already has the user data) the entire user data or partial user data of the user that Company A has .
  • Company A has the option of using a GPS locator security feature to validate the user identification Information.
  • the GPS locator security feature may be security feature that does not allow user data to be transferred to another Company unless an IP address or GPS locator matches the Company address listed on file (for that other Company).
  • Company A's computer system receiving Company B'a rewuest may check the IP address of the computer system from which the request was received to ensure that the checked IP address is on a list of authorized IP addresses in Company A's database (e.g. , by verifying that the checked IP address is the same as an authorized IP address associated with Company B).
  • Company A's computer system receiving Company B's request may check the IP address of the computer system from which the request was received to ensure that a location associated with the checked IP address is on a location at which Company A Is located (e.g,, by verifying that the checked IP address is associated with the same city or region as an address at which Company B Is located), GPS tagging may additionally or alternatively be tied to each of the user data when being transferred,
  • a Company may perform a trusted company representative verification.
  • Company A (which has the user data) may approve or decline the transfer of the user data
  • the user associated with the user data e.g., the person that owns the passport or driver's license, biometric data, etc.
  • the user may provide his user authorization code to Company B so that Company B can give that to Company A.
  • the user authorization code may serve as an acceptance by the user to transfer over the user data to Company B, If the Company is a government agency, and there is no law requiring the government agency to seek approval from the user before the transfer from government agency to government agency, then the government agency will not have to seek user approval, If the user accepts the transfer of his private data from Company A to Company B, then an ID verification process must be engaged to confirm that the user indeed Is the one that approved the transfer. For example, the user can either do a biometric scan on his or her mobile application to confirm he is who he says he Is or simply send a text message, Company or users tagging can occur In order to ensure a higher level of security. After the user agrees to the transfer of the user data, then the transfer will be completed either partially or fully depending on the user authorization code.
  • an important objective is how, in real time and without human Intervention, to verify user Identification Information among two or more entitles that is related to the verified documents of a user.
  • the nodes of a distributed database or ledger are linked together to create a trust utility for the cross-verification of user Identification data to facilitate cross-sharing transactions.
  • the distributed ledger la modified with software analytics to Include processing of secure user identification (ID) data associated with various kinds of user Identification documents.
  • Examples of such user ID documents include (a) private Information - e.g., AML documents such as a user ID card, driver's license, passport, utility bill or other document stating proof of Identity and address or contact information; (b) other private Information - e.g., KYC documentation such as mortgage loans, insurance policies, bank statements, investment account statements, medical records, or other personal data such as resumes or curriculum vitae documents; (c) biometric data Including scans or images or hashes of finger prints, retina, Iris or facial data, a voice print, photographs, behavioral characteristics, etc; and (d) person-to-person registration verification, i.e., P2PRV Information. P2P registration verification occurs when one person verifies the documentation of another person.
  • AML documents such as a user ID card, driver's license, passport, utility bill or other document stating proof of Identity and address or contact information
  • other private Information - e.g., KYC documentation such as mortgage loans, insurance policies, bank statements, investment account statements, medical records
  • person A Is already a registered user and person A, upon request, verifies the Identity of a person B.
  • a distributed database or ledger Is formed among entitles that have a need to exchange or share secure user ID Information related to verified user documents, all of which must be kept secure during such sharing transactions.
  • the "user” may Include customers, clients, other entitles, etc.
  • Verified documents may Include Information about products, services, customer data, contracts, etc.
  • the present Invention comprises a cross verification (CV) trust utility that includes a system of computer-implemented nodes connected In a network and configured by programmed instructions stored In respective non-volatile or non- transitory memory to form a distributed database or ledger, which controls processes operational in each node for ensuring secure access, through mechanisms configured for establishing a secure verification address for a digital user Identifier of a user related to verified documents of the user on the distributed ledger; validating the identity of a user's identification record associated with verified user documents stored in the distributed ledger of the system; and regulating access by an authorized entity to a user’s verified documents on the distributed ledger,
  • the present invention can be Implemented on platforms unrelated to distributed ledgers, such as databases or other suitable platforms.
  • the CV trust utility may also be called an "administrative company" that enables two or more trusted companies to perform Identification verifications and participate In the cross-sharing of user data between the trusted companies.
  • a trusted company e.g., company A or company B
  • the process for establishing a secure verification address for a digital user Identifier or biometric Identification data of a user related to verified documents of a user on the distributed ledger comprises steps of (a) activating an Interface configured to add or delete data related to verified documents or biometric identification data associated with the user (step 612); (b) encrypting the digital user Identifier or biometric Identification data associated with the verified documents of the user entered into the Interface (step 614); (c) associating the user’s digital user Identifier with files In the distributed ledger containing the user’s verified documents (step 616); and (d) recording the digital user identifier, the biometric Identification data or the verified documents In the verification address (step 618).
  • the data associated with the verified documents of a user can be encrypted,
  • the encryption of the data can be achieved by application of the AES algorithm, a PGP algorithm, the Blowflsh algorithm, or another suitable encryption algorithm.
  • the data associated with the verified documents of a user can be hashed.
  • the hashing of data can be achieved by application of an MD5 algorithm, 8HA algorithm (e.g. , SHA-0), SHA-2 algorithm (e.g., SHA-256) or other suitable hashing algorithm.
  • the process for validating the Identity of a user's Identification record associated with verified user documents stored In the system comprises steps of (a) receiving the user's encrypted identification data such as biometric Identification data, a digital user identifier, a user's location data set, or the verified user documents containing AML, KYC or KYB information (step 622); (b) decrypting the received Identification data (step 624); (c) comparing the decrypted Identification data with user Identification data stored In the distributed ledger system (626); and (d) outputting a determination of validation or Invalidity regarding the received user’s identification data (step 628).
  • the user's encrypted identification data such as biometric Identification data, a digital user identifier, a user's location data set, or the verified user documents containing AML, KYC or KYB information
  • the process for regulating access by an authorized entity to a user's verified documents on a distributed ledger comprises steps of (a) activating via the one or more processors In any node on the network an algorithm configured for determining an authorized access level of the entity requesting access (step 632); (b) assigning the entity requesting access to the determined authorized access level (step 634); (o) receiving an encrypted digital user Identifier of the user associated with the verified document sought by the requesting entity (step 636); (d) decrypting the received digital user !dentifler(step 638); and (e) controlling the grant or denial of access depending on verification of a match of the received digital unique Identifier with biometric Identification data of the user associated with the verified document sought by the requesting entity (step 640).
  • Figure 7 Illustrates one embodiment of a structure of the system 700 of present Invention that provides a Cross Verification Trust Utility 710 for performing the processes described and Illustrated In Figure 6.
  • the Cross Verification Trust Utility 710 - also called "CV 710" herein - may, for example, be embodied In an administrative trust utility providing the cross verification as a service.
  • an entity A which has Verified ID-proof documents of a first user or client in Its database, can respond to a request from an entity B for ID verification of the first user by making available the ID proof documents of the first user to entity B If the first user (contacted by the entity B to agree to a smart contract regarding the approval for access by entity B to the ID record (s) held by entity A) approves the request for access.
  • the system also accommodates the user's response to deny access as circumstances require it.
  • the cross verification trust utility CV 710 (which may also be called an ‘administrative company" 710 In some embodiments) may Include one or more servers 712 through 720, each containing programmed instructions in non-transltory memory (not shown) for performing the depicted functions.
  • the cross verification trust utility CV 710 preferably Includes a distributed database network 730 formed by a distributed network of database elements 731 , 733, 735, 737, and 739 in this example, each database element being connectable to each other database element In the distributed database network 730.
  • a database Is a collection of data organized to accommodate a variety of subject matter, arranged to enable convenient access and/or other processing functions.
  • the distributed database network 730 may be configured as a distributed ledger system as In a blockchain or as In an alternative that Is not a blockchain per se but a distributed ledger or other data network that may function at least in part In the manner of a blockchain. but which differs In significant ways.
  • An example of the latter type of distributed ledger Is the so called R3 Corda.
  • Other examples may Include Examples of a blockchain include the well-known Ethereum and HyperLedger Fabric.
  • Figure 7 depicts the modifications to the trust utility CV 710 according to the present Invention that provide the technological Improvement, heretofore not previously available, to a computer-implemented system operated according to specific new programmed Instructions that provides the novel advancement In the state of the art for cross verifying user or client Identification information, particularly among on-line entitles or on-line and physically-embodied entitles having a physical address at a real estate location, Figure 7 also deplete other entitles that typically Interact with the cross verification trust utility CV 710 through links or connections that are assigned numeric Identities In Figure 7. These numeric Identities represent paths or operations taking place In one example of a sequence for cross-verifying a user or client's digital unique identifier, user ID, biometric identification data, etc. These connections or linkages are labeled with the numerals 1 through 13 in Figure 7.
  • a user or client 750 using a laptop computer configured for operation In the system 700 may, at some previous time have entered - I.e., registered - via path #1 his or her Identification information and personal, private, or business documents along with affirmation of their authenticity (verification) Into the records of an entity represented as "company A" 750. Thus company A 760 may be said to have "captured” the user's Information. This information may be processed In a computer system 762 of company A and stored In a database 764 linked to computer system 762 In company A 760.
  • the sequence to be described begins at the "Enter" symbol 708 via the path #2, for example when an entity "Company B" 770, perhaps contacted by the user or client 750, or engaged In furthering a business activity or transaction of or associated with user or client 750. desires to verify the Identity of user or client 750, or Information provided by user or client 750, to company B 770 by communicating with company A,
  • the processes employed In the system 700 to accomplish this objective are described and Illustrated in Figure 6. The sequence for carrying out these processes may proceed as depicted In Figure 7 and described as follows.
  • Company B 770 In path #3 forwards a request to CV 710 for obtaining ID-proof documents of user 750 along with providing a "requester verification address" from company B 770 to the CV 710 at server 712 to process the request,
  • the request Is then sent by server 712 along path #4 to the user 750, with the "requester verification address" of company B, for approving company B’s request for the user's ID proof document,
  • the user 750 can respond, In this example, In one of two ways, either by (a) submitting along path #5a the user's approval and the requester verification address" or by (b) submitting the biometric Identification information along path #5b to a biometric authentication server 714 in the CV 710 for authenticating the user's identity.
  • the submission reaches server 716 along path # 6 to create a smart contract that may be signed with the user's private key (stored In the user or client's computer system 752) corresponding to an approver verification address of the user or client 750.
  • the contract may Include an’approver address", which Is the user's verification address; and a“requester address’, which Is company B's verification address.
  • the user submits his or her biometric identification data along path #5b to the server 714 to perform a biometric authentication.
  • the validation network In the CV 710 may preferably be a distributed database 730 formed by a plurality of database nodes connected to each other In the network, Whether the distributed database 730 Is configured as a distributed ledger In a blockchaln-based ledger or a non-blockchain-based ledger, the distributed ledger operates to validate the smart contract and record the smart contract, to thereby release the verified documents of the user or client 750 to company B, followed by sending along path #10 the validated smart contract within CV 710 at server 720 to process the delivering of the user's Identification documents (denoted in Figure 7 by the numeric #1 1. The delivery of the user's or client's ID-proof documents proceeds along path # 12 to company A 760 for storage therein, e.g. database 764, Subsequently the ID-proof documents of the user or client 750 may be provided by company A 760 to fulfill the request of company B 770 via path # 13. This completes the exemplary process performed by the CV 710,
  • the distributed ledger can vary from a general distributed database as follows: (a) the control of the read/write access is truly decentralized and not logically centralized as for other distributed databases, and as a result (b) there is an ability to secure transactions In competing environments, without trusted third parties, Distributed ledgers structures can be linear, such as blockchaln, or Incorporate Directed Acyclic Graphs (DAG), such as lota Tangle, Blockchaln, lota Tangle, and Hedera Hashgraph, are specific Instances of a distributed ledger, having respective predefined formats, algorithms, and access protocols,
  • DAG Directed Acyclic Graphs
  • Blockchaln is a distributed ledger capable of chronologically storing cryptographic bltcoln electronic money (CBEM) transactions,
  • CBEM cryptographic bltcoln electronic money
  • a blockchaln ledger all CBEM.transactlons are periodically verified and stored in a "block" that Is linked to the preceding block via a cryptographic hash.
  • the blockchaln ledger is publicly viewable, allowing the general public to view and keep track of CBEM transactions, Each network node can receive and maintain a copy of the blockchaln.
  • the present system may be used to facilitate the transfer of data without user or client approval when It is not required, This situation may arise when the request for ID verification originates from a government or a government agency to another government or agency, such as those cases when law or regulations do not permit the government or agency to request authorization from the user or client.
  • a modified security process may be required for transferring documents when one of the entities Is an On-Line company to limit the information that might come Into the hands of one who succeeds In hacking Into the on-line company’s system.
  • One example to provide limited access may proceed In two stages as follows, when the on-line company needs to confirm a client's identity.
  • the on-line company may request a message Verified'’ or‘Not Verified" from the trusted party that Includes the client's name and a unique identification number,
  • the unique Identification number may, for example, be randomly generated at the time the client completes a registration process at the trusted party's office, Even though the client may agree to transfer all of the Information requested, the on-line company may obtain partial information In stages.
  • the requesting on-line party may receive only the client's name, unique Identification number, and a text message "Verified” or “Not Verified.”
  • the requesting on-line party will request the remaining client information such as AML-type Identification information and/or KYC Information to confirm or authenticate the client's identity.

Abstract

System and methods for providing a universal decentralized solution for verification of users with cross- verification features, may be configured to receive from a first entity, at a trust utility such as a distributed database or blockchain, information related to one or more verified first documents, the one or more verified first documents associated with a first user. The system may receive from a second entity, at the trust utility, a request for the information related to the one or more verified: documents associated with the first user. The system may, upon receiving from the first user at the trust utility, an approval of the request for the information related to the one or more verified documents associated with the first user, give access to the second entity to obtain access to information related to the one or more verified documents associated with the first user.

Description

SYSTEMS AND METHODS FOR PROVIDING A UNIVERSAL DECENTRALIZED SOLUTION FOR VERIFICATION OF USERS WITH CROSS-VERIFICATION FEATURES
Technical Field This disclosure relates to systems and methods for providing verification of user Identity Information among business entities, and more particularly to providing a universal decentralized solution for verification of users with cross-verification features.
Description of the Prior Art Currently, systems and methods for securing information related to an individual Is or associated with documents of an Individual are lacking In various ways. There Is thus a need In the art for enhanced methods of securing such Information related to Individuals and their associated documents, For example, there Is a need In the art for improvements to biometric security methods for securing Information related to Individuals and documents,
Disclosure of the Invention
Some implementations according to the present technology are directed to software methods that improve computer functionality by Incorporating more robust security mechanisms Into the system. For example, It Is desirable to store Information associated with an Individual (user) In a secure fashion, Including but not limited to auch customary and accepted forms of personal identification associated with one or more users such as an identification card, passport, or other documents; other user data belonging to the user; or other Information associated with the user. In some Implementations, It may be desirable for the user to have the capability to allow or deny an entity (e.g„ a business, Institution, etc,) the right to access that Information. In some implementations, a user's biometric data and privacy will be well protected while sharing biometric data with the public and/or others through the medium of a trust utility such as a blockchaln (e.g., distributed ledger technology), a centralized ledger, or other trust utility organization, The present disclosure* In addition to customary and accepted forms of personal Identification, provides a system operative In real time and without human Intervention, to verify user identification information among two or more entities that Is related to the verified documents of a user. The invention Includes enhanced methods of biometric security of via face, retina, iris, fingerprint, and applied encrypted images for generating a biometric authentication code. The authentication code thus generated may then be applied or tagged directly to any data format that is utilized within a distributed ledger, such as in a blockchain-based system. Moreover, identification data associated with Individual users may be further enhanced by the use of geo-location and connection datasets.
For example, in one current problem that exists in the prior art, Firm A has products and clients Firm B wants to use and vice versa, However, to engage in a cross-sell transaction an exchange of some of their clients' data to the other in order to conduct that business. In this disclosure, such transaction may be facilitated by utilizing (1) a distributed ledger (e.g., each firm Is able to perform a keyword lookup to identify the number of clients Firm A has under that criteria); and (2) biometric Identification verification tied directly to clients (e.g., from AML, KYC, and/or other documentation), wherein each firm knows for certainty that those clients' documents and digital identity qualified via biometric authentication are verifiable. The terms AML (Arrtl- Money Laundering) and KYC (Know Your Customer) refer to accepted forms of identity Information useful In such authentication of the digital Identity of a user or client.
In some Implementations, a method and associated dashboard are contemplated. There may be a corresponding approval process running in a mobile application that facilitates each firm exchanging basic and premium profiles of a count of clients in order to cross-sell, with the clients' approval. If there Is more than one firm, this may be accomplished In a one-to-one fashion or a many-to-many cross-matching fashion.
One aspect of the disclosure may relate to a system configured for a universal decentralized solution for verification of users with cross-verification features. The system may include one or more physical (i.e., hardware) processors and/or other components. The one or more physical processors may be configured by machlne- readable instructions to receive from a first entity, at a blockchain or trust utility, Information related to one or more verified first documents, the verified first documents associated with a first user. The physical processors may be configured to receive from a second entity, at the blockchain or trust utility, a request for the Information related to the verified documents associated with the first user. The physical processors may be configured to, upon receiving from the first user, at the blockchain or trust utility, an approval of the request tor the Information related to the verified documents associated with the first user, give access, by the blockchain or trust utility, to the second entity to obtain access to Information related to the verified documents associated with the first user, The physical processors may be configured to, upon receiving from the first user, at the blockchain or trust utility, a denial of the request for the Information related to the verified documents associated with the first user, deny access, by the blockchain or trust utility, to the second entity to obtain access to Information related to the verified documents associated with the first user.
Another aspect of the disclosure may relate to a method for providing a universal decentralized solution for verification of users with cross-verification features, the method being performed by one or more physical processors configured by machine-readable instructions. The method may include receiving from a first entity, at a blockchain or trust utility, Information related to verified first documents, the verified first documents associated with a first user. The method may Include receiving from a second entity, at the blockchain or trust utility, a request for the information related to the verified documents associated with the first user. The method may Include, upon receiving from the first user, at the blockchain or trust utility, an approval of the request for the Information related to the verified documents associated with the first user, giving access, by the blockchain or trust utility, to the second entity to obtain access to information related to the verified documents associated with the first user, The method may include, upon receiving from the first user, at the blockchain or trust utility, a denial of the request for the Information related to the verified documents associated with the first user, denying access, by the blockchain or trust utility, to the second entity to obtain access to information related to the verified documents associated with the first user. These and other features, and characteristics of the present technology, as well as the methods of operation and functions of the related elements of structure and the combination of parts and economies of manufacture, will become more apparent upon consideration of the following description and the appended claims with reference to the accompanying drawings, all of which form a part of this specification, wherein like reference numerals designate corresponding parts In the various figures. It is to be expressly understood, however, that the drawings are for tiie purpose of Illustration and description only and are not intended as a definition of the limits of the invention. As used in the specification and In the claims, the singular form of "a", "an', and "the" Include plural referents unless the context clearly dictates otherwise. In addition, as used In the specification and the claims, the term "or means "and/or" unless the context clearly dictates otherwise.
Brief Description of the Drawings
FIG. 1 illustrates a system for providing a universal decentralized solution for verification of users with cross-verification features, in accordance with one or more implementations.
FIG. 2 is a schematic showing how entities may communicate with a blockchaln or trust utility, In accordance with one or more implementations
FIG. 3 Illustrates an overview of a blockchaln or trust utility with geo-location, In accordance with one or more implementations.
FIG, 4 Illustrates an applied blockchaln overview, In accordance with one or more implementations.
FIG. 5 illustrates a method for providing a universal decentralized solution for verification of users with cross-verification features, In accordance with one or more implementations .
FIG. 6 Illustrates a process operational In each node of a cross verification trust utility for ensuring a secure verification address for one of a digital user Identifier or biometric identification data of a user; and FIG. 7 illustrates a system for securing verified documents of a user held by a first entity and configured for responding to requests for access from a second entity upon authorization by the user.
Description of the Preferred Embodiment The Invention described herein Is directed to systems and methods for the facilitation of transactions between entities by verification of user's Identity information [according to FINRA rules, for example] In association with user documents among such entities as individuals, businesses, Institutions, etc. and In particular such transactions that are performed through encrypted communications on line without needing a trusted third party. In addition to cross verifying user identification Information, the system and the methods disclosed herein can also facilitate the transfer of a wide variety of digital assets.
The transactions are executed by agreements (such as so-called smart contracts) that are self-executing because certain specified conditions required for execution are pre-authorized and agreed -to In advance, In the manner of an If - Then premise.
The pre-authorization requires the provision of the party's Identities based on Identity documents such as government-issued documents (driver's license, social security number, passport, etc.), biometric scan data (images, fingerprints, voice prints, etc.), user location data, accredited Investor profiles, or other trusted references. The Identity documentation Is evaluated in comparison with stored identity Information through an algorithmic process to match the identity of a party to a transaction with stored Identity data for that party held by an entity Involved In the transaction to be executed.
The Identity Information held by an entity is that Identity Information submitted or obtained previously by the entity.
The Identity Information and the transaction ledger Information are stored and Immutable In a secure database such as a distributed or centralized ledger that provides a secure method for recording data. The distributed ledger functions as a trusted utility for facilitating and memorializing the details of the transaction.
AML and KYC documents are useful user identification resources because they contain or are associated with high quality, trust-worthy identification data. For example, AML documents associate user Information such as passports, driver’s licenses, perhaps social security numbers with transaction data known to be factually true. KYC documents Include user Information about financial transactions or assets useful In determining a user’s statue as an accredited Investor. Examples Include bank statements, Insurance policies, mortgage loan documents, Investment account information, etc. In one example AML and KYC documents may also be effectively used for user Identification of assets digitally such as stocks and bonds.
One type of distributed ledger Is a linear biockchain wherein data related to transaction documents and the digital signatures of the parties to the transaction are stored In blocks of data. The blocks of data are related through a process of sequentially hashing the blocks to form a chain. The chain of blocks Is replicated on all nodes In a peer-to-peer network of participating entitles. Non-linear distributed ledgers that employ directed acyclic graphs (DAG) include IOTA Tangle and Hedra Hashgraph. Such DAG-based systems have a topological ordering, such that a sequence has no directed cycles. Additionally, an Interplanetary File System (IPFS) can be implemented as part of thejnstant invention, such that peer-to-peer storage of data can be Implemented.
The biockchain may be a public, decentralized or permissionless system or a private, centralized or permiseloned system. Communication and access to both types may be secured by public/private keys. Other types of distributed ledgers include Ethereum, Hyperledger Fabric, and R3 Corda, which differ primarily In the processes used to obtain consensus among the nodes as to the accuracy of the ledger.
Cross Verification refers to the secure exchange of requests and information between two or more entitles as a precondition to a transaction - such as croas- selling - by verifying at one entity Information sent to It from another entity. The Information may be Identity information or documents, or It may be of data about the documents associated with the identity information. An example of cross verify could be the comparison of identification Information from various 'trust" parties to determine which one Is reliable.
FIG. 1 Illustrates a system 100 for providing a universal decentralized solution for verification of users with cross-verification features, In accordance with one or more Implementations, In some Implementations, system 100 may Include one or more servers 102. The server(s) 102 may be configured to communicate with one or more computing platforms 104 according to a client/server architecture, a peer-to-peer architecture, and/or other architectures. The users may access system 100 via computing platform(s) 104 such as desktop, laptop or tablet computers, and game consoles, wireless communication devices (e.g., smartphones), and other computing platforms capable of storing and executing program Instructions, The server(s) 102 may be configured to execute machine-readable Instructions 106. The machine-readable Instructions 106 may Include one or more of a machine readable Instruction components such as a receiving verified documents component 108, a receiving Information request component 110, a receiving user decision component 112, an approval/denial component 114, and/or other machine-readable Instruction components,
The machine-readable instructions 106 may be executable to establish verification addresses on a distributed ledger or other trust utility. Generally speaking, a trust utility may be a transaction database shared by some or all nodes participating In system 100. In a trust utility the trust is built Into the structure of the transaction database due to the security mechanisms Incorporated within it. For example, once a transaction is deposited with the trust utility, that information becomes immutable ~ i.e.. It cannot be altered. The participation of the nodes may be based on the Bitcoin protocol, Ethereum protocol, and/or other protocols related to digital currencies, and/or distributed ledgers (or other trust utilities). With respect to a blockchain, a full copy of the blockchain contains every transaction ever executed in an associated digital currency, In addition to transactions, other Information may be contained by the blockchaln or trust utility, such aa described further herein.
The blockchaln example of a trust utility may be based on several blocks. A block may include a record that contains and confirms one or more waiting transactions, Periodically (e.g,, roughly every one minute), a new block including transactions and/or other Information may be appended to the blockchaln, In some Implementations, a given block In the blockchaln contains a hash of the previous block. This may have the effect of creating a chain of blocks from a genesis block (i.e. , the first block In the blockchaln) to a current block. The given block may be guaranteed to come chronologically after a previous block because the previous block's hash would otherwise not be known. The given block may be computationally Impractical to modify once it is included In the blockchaln because every block after It would also have to be regenerated,
A given verification address may Include a specific location on the blockchaln, distributed ledger or trust utility where certain information is stored. In acme Implementations, an Individual verification address within the blockchaln or trust utility may be referred to as an "DUID Address." A DUID may be a "digital unique identifier" or a "digital unique Identity" In the context of verified first documents as defined below, The receiving verified documents component 108 may be configured to receive from a first entity, at a blockchaln or trust utility, Information related to one or more verified first documents. The verified first documents may be those documents associated with a first user (individual). The first entity may include of an Institution, business, company, and/or other entitles. In some Implementations, the blockchaln or trust utility of the present technology may differ from a standard blockchaln. It may differ In that although the present technology may utilize an Ethereum blockchaln (or any other type of blockchaln or trust utility not tied to any cryptocurrency), the Ethereum blockchaln and/or Ethereum private blockchaln may be created to be suited for various things. When Ethereum Is used as a public blockchaln a fee to execute the transaction Is required before the transaction can proceed. This fee is called "gas." When Ethereum is used as a private blockchain the gas fee must be paid but can be generated by mining, which Is a burdensome process* Some examples may include Integrating components related to biometric tagging and/or biometric encryption of documentation held within the blockchain. The use of datasets, while ensuring client/individual data privacy and adhering to rules for the global data processing directive Is envisioned.
The trust utility may be a closed loop trust utility private blockchain In some Implementations, In some Implementations, the closed loop trust utility private blockchain may be made country-specific, In some Implementations, due to data protection and information communication office rules In different countries, the trust utility or distributed ledger may not be operated as a decentralized model. Instead, the trust utility may be operated as a closed-loop or centralized model. One reason some implementations may be country-specific Is the scenario where a first country and/or business do not want confidential and/or secure Information to be shared or accessed by a second country and/or business. The trust utility may be enabled to have separate implementations for country-specific practices. It should be noted that the distributed ledger or trust utility may be operated as either a centralized model or a decentralized model, In various implementations,
In some implementations, the Information related to the verified documents associated with the first user may be encrypted with a first key and a second key. The first key may be a server key (e.g., a private key) that is stored on a backend server. The second key may be a client key that Is a hash of biometric data associated with the first user (e.g., a hash generated by providing the biometric data as Input to a one-way hashing algorithm). In some Implementations, the first and second keys may be applied to the blockchain Immutable ID for hyper-encryption of sensitive data formats and/or associated documentation.
Receiving Information request component 110 may be configured to receive from a second entity, at the blockchain or trust utility, a request for the Information related to the verified documents associated with the first user. The second entity may Include one or more of an Institution, business, company, and/or other entities. Receiving user decision component 112 may be configured to receive a decision (to give access or deny access) from the first user regarding the request for the Information related to the verified documents associated with the first user at the blockchain or trust utility, In some Implementations, approval/denial component 114 may be configured to give or deny access to the first entity, if the request for the Information is approved by the first user, access may be given by the trust utility for the second entity to obtain access to the Information, Likewise, if the request for the information Is not approved by the first user, access may be denied by toe trust utility for the second entity to obtain access to the Information. In some Implementations, the trust utility holds and applies biometric authentication code validation against Information related to the verified documents associated with the first user. In some Implementations, the first user may be notified If information related to the verified documents associated with the first user Is accessed by authorities or others, System 100 may be configured to associate identifiers with individuals having previously verified personal identities. For example, a first identifier may be associated with a first Individual, The first individual may have a previously verified personal Identity. Generally speaking, an identifier may include one or more of a number, an alphanumeric code, a username, and/or other Information that can be linked to an Individual. In some Implementations, an Individual identifier may be referred to as DUID or digital unique ID,
In accordance with some Implementations, an individual having a previously verified personal identity may have obtained the previously verified personal Identity through a variety of approaches and the Individual may be required to provide evidence of the individual's identity, Such evidence (five Information referred to above) may Include one or more of providing a copy of a government Issued identification (e.g., passport and/or driver's license), providing a copy of mall received by the Individual (e.g„ a utility bill), evidence provided by a third party, and/or other evidence on an Individual's identity. The evidence may be provided to an entity associated with server(s) 102. System 100 may be configured to assign verification addresses on a trust utility to the Individuals. A given verification address may generated based on a public key and/or a private key. By way of example, a first verification address may be assigned to the first individual. The first verification address may be generated based on a first public key and/or a first private key,
Generally speaking, a public and private key-pair may be used for encryption and decryption according to one or more public key algorithms. By way of non-limiting example, a key pair may be used for digital signatures. Such a key pair may Include a private key for signing and a public key for verification. The public key may be widely distributed, while the private key Is kept secret (e g., known only to its proprietor). The keys may be related mathematically, but calculating the private key from the public key Is unfeasible.
In some Implementations, system 100 may be configured such that private keys may be stored within computing platform(s) 104, For example, the first private key may be stored within a computing platform 104 and/or other locations associated with the first individual. In accordance with some Implementations, a private key may be stored In one or more of a user's "verify, dat" file, a SIM card, and/or other locations.
In some implementations, system 100 may be configured such that multiple verification addresses may be assigned to separate individuals. For example, In addition to the first verification address, a second verification address may be assigned to the first individual. One or more additional verification addressee may be assigned to the first Individual, In accordance with one or more implementations,
System 100 may be configured to record Identifiers and biometric data associated with the Individuals at corresponding verification addresses. For example, the first Identifier and first biometric data associated with the first individual may be recorded at the first verification address. Recording Information at a given verification address may Include recording a hash or other encrypted representation of the Information. In some Implementations, different biometric data may be recorded at multiple verification addresses assigned to a single given Individual. For example, In addition to the first Identifier and the first biometric data associated with the first individual (first user) being recorded at the first verification address, the first identifier and second biometric data associated with the first individual may be recorded at a second verification address.
Generally apeaking, biometric data may Include metrics related to human characteristics. Biometric Identifiers are distinctive, measurable characteristics that can be used to label and describe Individuals, Biometric Identifiers typically include physiological characteristics, but may also Include behavioral characteristics and/or other characteristics. Physiological characteristics may be related to the shape of an individual's body. Examples of physiological characteristics used as biometric data may include one or more of fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, Iris recognition, retina, odor or scent, and/or other physiological characteristics. Behavioral characteristics may be related to a pattern of behavior of an Individual. Examples of behavioral characteristics used as biometric data may include one or more of typing rhythm, gait, voice, and/or other behavioral characteristics. Online user behavioral characteristics may include a cyber behavior profile to Identify a person's Identity,
The biometric data may Include one or more of an image or other visual representation of a physiological characteristic, a recording of a behavioral characteristic, a template of a physiological characteristic and/or behavioral characteristic, and/or other biometric data. A template may Include a synthesis of relevant features extracted from the source. A template may include one or more of a vector describing features of a physiological characteristic and/or behavioral characteristic, a numerical representation of a physiological characteristic and/or behavioral characteristic, an image with particular properties, and/or other Information.
Biometric data may be received via computing platforms 104 associated with the individuals. For example, biometric data associated with a first Individual may be received via a first computing platform 104 associated with the first Individual. The first computing platform 104 may Include an Input device (not depicted) configured to capture and/or record a physiological characteristic and/or behavioral characteristic of the first individual. Examples of such an Input device may Include one or more of a camera and/or other Imaging device, a fingerprint scanner, a microphone, an accelerometer, and/or other Input devices,
System 100 may be configured to provide an Interface for presentation to individuals via associated computing platforms 104. The interface may Include a graphical user Interface presented via individual computing platforms 104. According to some Implementations, the Interface may be configured to allow a given Individual to add or delete verification addresses assigned to the given individual so long as st least one verification address Is assigned to the given Individual,
In some Implementations, system 100 may be configured to access and/or manage one or more user profiles and/or user Information associated with users of system 100, The user profiles and/or user Information may include information stored by server(s) 102, one or more of the computing platform(s) 104, and/or other storage locations. The user profiles may includes for example, Information identifying users (e.g., a username or handle, a number, an Identifier, and/or other identifying Information), security login information (e.g., a login code or password), system account information, subscription information, digital currency account Information (e.g., related to currency held In credit for a user), relationship information (e.g„ Information related to relationships between users In system 100), system usage Information, demographic information associated with users, Interaction history among users In system 100, Information stated by users, purchase information of users, browsing history of users, a computing platform Identification associated with a user, a phone number associated with a user, and/or other Information related to users.
The machine-readable Instructions 106 may be executable to perform blockchain- based multifactor personal identity verification using the verification addresses.
System 100 may be configured to receive one or more Identifiers in connection with one or more requests to verify an Identity of one or more Individuals. For example, the first identifier may be received in connection with a request to verify an Identity of the first Individual. Requests for identity verification may be provided in connection with and/or related to financial transactions, Information exchanges, and/or other interactions. Requests may be received from other individuals and/or other third parties.
System 100 may be configured to extract the biometric data associated with the one or more individuals from the corresponding verification addresses. For example, the first biometric data associated with the first Individual may be extracted from the first verification address. Extracting Information (e.g., biometric data) from a verification address may Include decrypting information.
According to some Implementations, system 100 may be configured such that, responsive to receiving the request to verify the Identity of the first individual, a prompt may be provided to the first individual for biometric data matching the first biometric data and a private key matching the first private key. The prompt may be conveyed via a computing platform 104 associated with the first Individual. The prompt may be conveyed via a graphical user interface and/or other ueer interface provided by the computing platform 104 associated with the first Individual. The prompt may Indude an Indication that is one or more of visual, audible, haptic, and/or other indications.
In some implementations, system 100 may be configured such that, responsive to receiving the request to verify the Identity of the first Individual, a prompt may be provided to a computing platform 104 associated with the first Individual. The prompt may cause the computing platform 104 to automatically provide, to server(s) 102, biometric data matching the first biometric data and/or a private key matching the first private key,
System 100 may be configured to verify the identity of the individuals upon, or In response to, receiving matching biometric data and private keys, For example, the personal Identity of the first Individual may be verified upon receipt of (1 ) biometric data matching the first biometric data and (2) a private key matching the first private key. Verifying the personal Identity of the first Individual may Include comparing stored information with newly received Information, According to some Implementations, Identity system 100 may be configured such that the personal identity of the first Individual may be verified upon receipt of (1) biometric data matching the first biometric data or the second biometric data and (2) a private key matching the first private key. Such Implementations may provide so- called "M-of-N" signatures for identity verification where some subset of a larger set of Identifying Information Is required.
In some implementations, system 100 may be configured such that the biometric data matching the first biometric data and the private key matching the first private key may be used to sign the verification of the personal Identity of the first Individual. In some Implementations, at least one dedicated node performs the signing of the verification of the personal Identity of the first Individual or user. A given dedicated node may Include one or more of server(s) 102, The given dedicated node may be a public node or a private node configured for creating new blocks and/or for signing verification.
FIG. 2 is a schematic 200 showing how entities may communicate with a blockchain or trust utility 202, In accordance with one or more Implementations. Blockchain or trust utility 202 may receive from a first entity 204, Information related to one or more verified first documents 206. the verified first documents 206 associated with a first user.
In some Implementations, blockchain or trust utility 202 may receive from a second entity 206 a request for the Information related to the verified documents 206 associated with the first user. One or more documents 206 may be encrypted using, for example, an entity key to provide unique access.
In some Implementations, blockchain or trust utility 202 may receive a decision (approval or denial) from the first user, regarding the request for the information related to the verified documents associated with the first user.
In some implementations, system 100 may give (grant) or deny access to the first user. If the request for the Information Is approved by the first user, access may be given by blockchain or trust utility 202 for second entity 208 to obtain access to the Information, Likewise, if the request for the Information Is not approved by the first user, access may be denied by blockchaln or trust utility 202 for second entity 208 to obtain access to the Information.
FIG. 3 illustrates an overview 300 of blockchaln or trust utility 202 with geo-location, In accordance with one or more Implementations, Location data may be any information about an Individual's current location, or about their movements in the past, which can be linked to them. In some implementations, the typea of data collected and applicable may Include: base station data Received Signal Strength Indicator (RSSI), Time Difference of Arrival (TDOA), and Angle Of Arrival (AO A), GPS data, WiFi Access points (including Medium Access Control (MAC) addresses via mobile or passive scanning); static geo-location, dynamic/ongoing geolocation, location-based services and/or service set IDs (SSIDs). The use of keyhole markup language (KML) files to create datasets is contemplated; however, the use of any location-based detaset that utilizes markup languages Is contemplated. In some embodiments, certain rules for geo-location may be followed. A legal framework may be the data protection directive (95/46/EC). It may apply in cases where personal data la being processed as a result of the processing of location data. The e-privacy directive (2002/56/EC, as revised by 2009/136/EC) applies to the processing of base station data by public electronic communication services and networks (teiecom operators). In some Implementations, blockchaln or trust utility 202 generically holds and applies biometric code validation against one or more of anti-money laundering (AML) documents, know your customer (KYC) documents, know your business (KYB) documents (such as formation documents, bank statements, annual reports, transaction Information, etc.), know your peraon/proceas (KYP) documents, extraneous documents linked to businesses and Individuals, various authentication credentials, and/or other items.
FIG. 4 illustrates an an example of a private, permlssloned blockchaln overview 400, In accordance with one or more Implementations. As shown and described in the figure, a privacy permlssionlng administration layer for the blockchaln Is envisioned. It may be built on, for example, an Ethereum (public, permissionless) blockchaln. As shown, there may be a mechanism for the storage of files (e.g., biometric data, etc.). These items may be coupled with an application programming interface (API) and, Inter alia, a BigChalnDB, This may be coupled with, for example, a biometric app and a website, among other things. In alternative embodiments, the trust utility may be be built on any type of distributed ledger architecture. In some Implementations, servers) 102, computing platform(s) 104, and/or external resources 122 may be operatively linked via one or more electronic communication links. For example, such electronic communication links may be established, at least In part, via a network such as the Internet and/or other networks, It will be appreciated that this is not Intended to be limiting, and that the scope of this disclosure Includes implementations in which server(s) 102, computing platform(s) 104, and/or external resources 122 may be operatively linked via some other communication media.
A given computing platform 104 may Include one or more processors configured to execute machine-readable Instructions. The machine-readable Instructions may be configured to enable an expert or user associated with the given computing platform 104 to Interface with system 100 and/or external resources 122, and/or provide other functionality attributed herein to computing platform(s) 104. By way of non-limiting example, the given computing platform 104 may Include one or more of a desktop computer, a laptop computer, a handheld computer, a tablet computing platform, a NetBook, a Smartphone, a gaming console, and/or other computing platforms.
Extemal resources 122 may Include sources of Information, hosts, and/or providers of virtual environments outside of system 100, external entities participating with system 100, and/or other resources. In some Implementations, some or all of the functionality attributed herein to external resources 100 may be provided by resources included In system 100.
Server(s) 102 may include electronic storage 124, one or more processors 126, and/or other components, Server(s) 102 may Include communication lines, or ports to enable the exchange of Information with a network and/or other computing platforms, Illustration of server(s) 102 in FIG. 1 Is not Intended to be limiting. Server(s) 102 may include a plurality of hardware, software, and/or firmware components operating together to provide the functionality attributed herein to server(s) 102, For example, server(e) 102 may be implemented by a cloud of computing platforms operating together as server(e) 102.
Electronic storage 124 may comprise non-transltory storage media that electronically stores information. The electronic storage media of electronic storage 124 may Include one or both of system storage that Is provided integrally (i.e., substantially non-removable) with servers) 102 and/or removable storage that Is removably connectable to server(s) 102 via, for example, a port (e.g„ a USB port, a firewire port, etc.) or a drive (e.g., a disk drive, etc.), Electronic storage 124 may include one or more of optically readable storage media (e.g., optical disks, etc.), magnetically readable storage media (e.g., magnetic tape, magnetic hard drive, floppy drive, etc.), electrical charge-based storage media (e.g., EEPROM, RAM, etc.), solid-state storage media (e.g., flash drive, etc.), and/or other electronically readable storage media. Electronic storage 124 may Include one or more virtual storage resources (e.g., cloud storage, a virtual private network, and/or other virtual storage resources).
Electronic storage 124 may store software algorithms, Information determined by processor(s) 126, information received from servers) 102, Information received from computing platform(s) 104, and/or other Information that enables servers) 102 to function as described herein. Processor^) 126 may be configured to provide Information processing capabilities in server(s) 102. As such, processor(s) 126 may include one or more of a digital processor, an analog processor, a digital circuit designed to process Information, an analog circuit designed to process Information, a state machine, and/or other mechanisms for electronically processing Information, Although processor(s) 126 Is shown In FIG. 1 as a single entity, this Is for Illustrative purposes only. In some Implementations, proceasor(s) 126 may include a plurality of processing units. These processing units may be physically located within the same device, or processor(s) 126 may represent processing functionality of a plurality of devices operating In coordination. Processor(s) 126 may be configured to execute machine- readable Instruction components 108, 110, 112, 114, and/or other machine-readable Instruction components. Processors) 126 may be configured to execute machine- readable Instruction components 108, 110, 1 12, 114, and/or other machine-readable Instruction components by software; hardware; firmware; some combination of software, hardware, and/or firmware; and/or other mechanisms for configuring processing capabilities on processor(s) 126, As used herein, the term“machine- readable instruction component" may refer to any component or set of components that perform the functionality attributed to the machine-readable Instruction component, This may Include one or more physical processors during execution of processor readable instructions, the processor readable Instructions, circuitry, hardware, storage media, or any other components. It should be appreciated that although machine-readable Instruction components 108, 110, 112, 114 are illuatrated In FIG. 1 as being Implemented within a single processing unit, In Implementations in which processor(s) 126 Includes multiple processing units, one or more of machine-readable instruction components 108, 110, 112, and/or 114 may be Implemented remotely from the other machine-readable Instruction components. The description of the functionality provided by the different machine-readable Instruction components 108, 110, 112, and/or 14 described below Is for Illustrative purposes, and Is not Intended to be limiting, as any of machine- readable Instruction components 106, 110, 1 12, and/or 114 may provide more or less functionality than Is described. For example, one or more of machine-readable Instruction components 108, 110, 1 12, and/or 114 may be eliminated, and some or all of Its functionality may be provided by other ones of machine-readable instruction components 108, 110, 112, and/or 114. As another example, processor(s) 126 may be configured to execute one or more additional machine-readable Instruction components that may perform some or all of the functionality attributed below to one of machine-readable instruction components 108, 1 10, 112, and/or 114.
FIG, 6 illustrates a method 500 for providing a universal decentralized solution for verification of users with cross-verification features, In accordance with one or more Implementations. The operations of method 500 presented below are Intended to be illustrative. In some implementations, method 500 may be accomplished with one or more additional operations not described, and/or without one or more of the operations discussed. Additionally, the order In which the operations of method 600 are Illustrated In FIG. 5 and described below Is not Intended to be limiting.
In some Implementations, one or more operations of method 500 may be Implemented In one or more processing devices (e.g., a digital processor, an analog processor, a digital circuit designed to process information, an analog circuit designed to process Information, a state machine, and/or other mechanisms for electronically processing information). The one or more processing devices may Include one or more devices executing some or all of the operations of method 500 In response to instructions stored electronically on an electronic storage medium. The one or more processing devices may Include one or more devices configured through hardware, firmware, and/or software to be specifically designed for execution of one or more of the operations of method 600,
At an operation 502, method 600 may Include receiving Information related to one or more verified first documents 206. As an example, the verified first documents may be received at a blockchain or trust utility from a first entity (e.g., first entity 204). The verified first documents 206 may be associated with a first user. Operation 502 may be performed by one or more physical processors configured to execute a machine-readable Instruction component that Is the same as or similar to receiving verified documents component 108 (as described In connection with FIG. 1), In accordance with one or more implementations.
At an operation 504, method 500 may Include receiving a request for the Information related to the verified documents (e.g., associated with the first user). As an example, the request may be received at the blockchain or trust utility from a second entity (e.g., second entity 206). Operation 504 may be performed by one or more physical processors configured to execute a machine-readable instruction component that is the same as or similar to receiving Information request component 110 (as described In connection with FIG. 1), In accordance with one or more Implementations.
At an operation 606. method 500 may Include receiving a user decision (e.g., approval, denial, etc.). As an example, the user decision may be received at the blockohain or trust utility from the first user. The user decision may be with regard to the request for access to the verified documents associated with the first user or the Information related to the associated verified documents. Operation 506 may be performed by one or more physical processors configured to execute a machine-readable Instruction component that Is the same as or similar to receiving user decision component 112 (as described In connection with FIG. 1), in accordance with one or more Implementations.
At an operation 508, method 500 may Include giving or denying access to second entity 208. If the request for the Information Is approved by the first user, access may be given by blockchaln or trust utility 202 for second entity 208 to obtain access to the Information. Likewise, If the request for the Information Is not approved by the first user, access may be denied by the blockchaln or trust utility for second entity 208 to obtain access to the Information. Operation 508 may be performed by one or more physical processors configured to execute a machine-readable Instruction component that Is the same as or similar to approval/denial component 114 (as described in connection with FIG. 1), In accordance with one or more implementations.
Exemplary Implementations may facilitate storing personal data on the blockchaln. The personal data may be stored on the blockchaln In an encrypted way. A person may be identified at the blockchaln level with one or more of a private key, a finger print, a finger print hash, an eye retina, an eye retina hash, and/or other unique information. The data stored may Include or relate to one or more of a passport, an identification card, extracted passport Information, a driver's license, extracted driver's license Information, finger print, eye retina, and/or other Information. According to some implementations, If some of the data is changed, a new record may be created for that person In the blockchaln. That Is, all changes are added as new records, The old record will always be stored on the blockchaln. Generally speaking, all records on the blockchaln are stored forever and cannot be removed. More than one copy of the blockchaln will exist to ensure the records are not manipulated. Exemplary implementations may facilitate access to personal data. There may be multiple access levels for the personal data in the blockchaln trust utility. Access controls may be granted on public/private key pairs levels. Examples of access levels may include one or more of Super Admin (full access to the distributed ledger, database or blockchaln), Authorlties-country level (full read-only access), Authorlties- state/local level (limited read-only access), Police and other services Including Emergency (access to certain personal data by Finger Print/Eye retina of that person only), Participating Merchants (limited access), and/or other access levels.
Exemplary implementations may facilitate verification check. There may be multiple levels for how It Is possible to check verification. For example, some Implementations may ensure a person has a record at "Company" but no personal data Is provided. Some Implementations may ensure a person has a record at Company and get very basic personal information such as Full Name, DOB, Gender, and/or other basic Information. Some Implementations may ensure a person has a record at Company and get all personal data.
In some Implementations, the technology may relate to using the PAS 1192*5 standard to manage construction Information and keep Information related to architecture and building construction and Infrastructure security, PAS (Publicly Available Specification) 1192-5 Is a standard published by the British Standards Organization for security-minded building Information modeling (BIM) and smart asset management. These aspects may be related to relation to smart Cities, connected cities, connected houses, smart grids (e.g. energy, etc,), and/or the like. Theee aspects may relate to the underlying security for Internet of Things (loT) for smart devices interconnecting but at a construction, architectural, and/or grid based level
AS 1192-5:2016 is the specification for security-minded building Information modelling, digital built environments and smart asset management
PAS 1192-5 specifies the processes that may assist organizations In Identifying and Implementing appropriate and proportionate measures to reduce the risk of loss or disclosure of Information that could Impact on the safety and security of: personnel and other occupants or users of the built asset and Its services; the built asset Itself; asset information; and/or the benefits the built asset exists to deliver,
Such processes can also be applied to protect against the loss, theft, and/or disclosure of valuable commercial Information and Intellectual property. The PAS has been developed to Integrate a security-minded approach Into the construction lifecycle processes as specified In PAS 1192-2 and the asset management processes described In PAS 1192-3,
PAS may be specifically applied to the built asset, which may be a single building, e site or campus, and/or a portfolio or network of assets, These aspects may be related to the mobile data that can be processed, collated, and/or held within the distributed ledger (whether in regards to the biometric Identity of an individual and/or client),
In use, the system of the present Invention, for example as depicted in Figure 4, fulfills two primary functions: (1) the addition of data to the platform regarding entities to enable the cross-sharing of information among them, the Information to Include Information about trusted entitles, user ID Information from various sources, and files of biometric ID data about users; and (2) the response to an inquiry or request from one entity to another to initiate cross-verification of data,
In one use case, for example, an administrative company adds Company A and to Company B to the platform (e.g„ system 100) ao that both companies can perform ID verifications and participate In the cross sharing of user data between companies, With regard to this use case, a company may include a bank, Insurance company, financial Industry, mobile Industry, government industry, public industry, or any type of other entities that are considered trusted companies, In some cases, the trusted companies may include ATM (automated teller machine) companies and terminals. In some cases, a trust company may Include a company or Individual that Is regulated by any form of a government entity. In the foregoing use case, a company may add data of a user to Its database. The user data may Include the user's private data, for example the user's Identification card, driver's license, passport, utility bill, and or other documents that states proof of Identification and address (e.g., AML-based (Anti-Money Laundering) or KYC-based (Know Your Customer) documents). The user data may additionally or alternatively Include Insurance documents, financial documents, medical records, or other document or personal data that belongs to the user. Such user data may further Include the user’s biometric data (e.g., recognition data for the user's face, retina/lrla, fingerprint, heartbeat, vein, voice, etc.). The user or the trusted company can then create a user authorization code.
With respect to the foregoing use case, a company may obtain the user's biometric data or other private self-identifying data In a number of ways (e.g., In-person by a trusted company representative or government agency or in other manners). Biometric data may also be captured using a mobile application (e.g., via the hosting user device’s camera or other sensor) or with an external biometric capturing device that can be attached to a user device or other computing device, in some cases, a biometrics ATM may be used, In some cases, the biometric data may be confirmed without the user being present in the presence of a trusted party. As an example, a QR Code (e.g., linking to the biometric data) may be transmitted (e.g., via email, text messaging, etc.) to the user to confirm that the biometric data belongs to the user, Other means of ID verification may additionally or alternatively be used.
For Instance, person to person registration verification (P2PRV) may be utilized to provide ID verification. P2PRV may Include Person A verifying the documentation and registering Person B, where Person A has already been registered by a trusted company. Person A may verity Person B's documentation (e.g., by comparing Person B to his/her photo In Person B's documentation, asking Person B verification questions related to the documentation, etc.) and confirm that Person B Is actually the one completing the biometric scan. Person A may enter the confirmation into the verification system.
In one use case, Company B (e.g., a secondary entity requesting user data of a user) may request from Company A (e.g,, a primary entity that already has the user data) the entire user data or partial user data of the user that Company A has . Company A has the option of using a GPS locator security feature to validate the user identification Information. As an example, the GPS locator security feature may be security feature that does not allow user data to be transferred to another Company unless an IP address or GPS locator matches the Company address listed on file (for that other Company). For example, Company A's computer system receiving Company B'a rewuest may check the IP address of the computer system from which the request was received to ensure that the checked IP address is on a list of authorized IP addresses in Company A's database (e.g. , by verifying that the checked IP address is the same as an authorized IP address associated with Company B). As another example, Company A's computer system receiving Company B's request may check the IP address of the computer system from which the request was received to ensure that a location associated with the checked IP address is on a location at which Company A Is located (e.g,, by verifying that the checked IP address is associated with the same city or region as an address at which Company B Is located), GPS tagging may additionally or alternatively be tied to each of the user data when being transferred,
With respect to toe foregoing use case, a Company may perform a trusted company representative verification. As an example, Company A (which has the user data) may approve or decline the transfer of the user data, the user associated with the user data (e.g., the person that owns the passport or driver's license, biometric data, etc.) may be given a message in the form of an email, application notification via mobile application, text messaging, telephone call, or other form of communication to allow the user to approve or decline the request, The user may provide his user authorization code to Company B so that Company B can give that to Company A. The user authorization code may serve as an acceptance by the user to transfer over the user data to Company B, If the Company is a government agency, and there is no law requiring the government agency to seek approval from the user before the transfer from government agency to government agency, then the government agency will not have to seek user approval, If the user accepts the transfer of his private data from Company A to Company B, then an ID verification process must be engaged to confirm that the user indeed Is the one that approved the transfer. For example, the user can either do a biometric scan on his or her mobile application to confirm he is who he says he Is or simply send a text message, Company or users tagging can occur In order to ensure a higher level of security. After the user agrees to the transfer of the user data, then the transfer will be completed either partially or fully depending on the user authorization code.
As noted in the Summary of the Invention, an important objective is how, in real time and without human Intervention, to verify user Identification Information among two or more entitles that is related to the verified documents of a user. In one embodiment of the present system the nodes of a distributed database or ledger are linked together to create a trust utility for the cross-verification of user Identification data to facilitate cross-sharing transactions. The distributed ledger la modified with software analytics to Include processing of secure user identification (ID) data associated with various kinds of user Identification documents. Examples of such user ID documents include (a) private Information - e.g., AML documents such as a user ID card, driver's license, passport, utility bill or other document stating proof of Identity and address or contact information; (b) other private Information - e.g., KYC documentation such as mortgage loans, insurance policies, bank statements, investment account statements, medical records, or other personal data such as resumes or curriculum vitae documents; (c) biometric data Including scans or images or hashes of finger prints, retina, Iris or facial data, a voice print, photographs, behavioral characteristics, etc; and (d) person-to-person registration verification, i.e., P2PRV Information. P2P registration verification occurs when one person verifies the documentation of another person. For example, person A Is already a registered user and person A, upon request, verifies the Identity of a person B. Thus, a distributed database or ledger Is formed among entitles that have a need to exchange or share secure user ID Information related to verified user documents, all of which must be kept secure during such sharing transactions. The "user" may Include customers, clients, other entitles, etc. Verified documents may Include Information about products, services, customer data, contracts, etc. Broadly stated, the present Invention comprises a cross verification (CV) trust utility that includes a system of computer-implemented nodes connected In a network and configured by programmed instructions stored In respective non-volatile or non- transitory memory to form a distributed database or ledger, which controls processes operational in each node for ensuring secure access, through mechanisms configured for establishing a secure verification address for a digital user Identifier of a user related to verified documents of the user on the distributed ledger; validating the identity of a user's identification record associated with verified user documents stored in the distributed ledger of the system; and regulating access by an authorized entity to a user’s verified documents on the distributed ledger, Alternatively, the present invention can be Implemented on platforms unrelated to distributed ledgers, such as databases or other suitable platforms. The CV trust utility (See Figure 7 to be described) may also be called an "administrative company" that enables two or more trusted companies to perform Identification verifications and participate In the cross-sharing of user data between the trusted companies. A trusted company (e.g., company A or company B) Is a company or individual that is regulated by any form of government, Examples Include without limitation banks, Insurance companies, entitles In the financial, telecom, and transportation industries, etc,
In one embodiment illustrated In Figure 6 (See steps 610 and 612 - 618) the process for establishing a secure verification address for a digital user Identifier or biometric Identification data of a user related to verified documents of a user on the distributed ledger comprises steps of (a) activating an Interface configured to add or delete data related to verified documents or biometric identification data associated with the user (step 612); (b) encrypting the digital user Identifier or biometric Identification data associated with the verified documents of the user entered into the Interface (step 614); (c) associating the user’s digital user Identifier with files In the distributed ledger containing the user’s verified documents (step 616); and (d) recording the digital user identifier, the biometric Identification data or the verified documents In the verification address (step 618). In one embodiment, the data associated with the verified documents of a user can be encrypted, The encryption of the data can be achieved by application of the AES algorithm, a PGP algorithm, the Blowflsh algorithm, or another suitable encryption algorithm. In another embodiment, the data associated with the verified documents of a user can be hashed. The hashing of data can be achieved by application of an MD5 algorithm, 8HA algorithm (e.g. , SHA-0), SHA-2 algorithm (e.g., SHA-256) or other suitable hashing algorithm.
In another embodiment Illustrated In Figure 6 (See steps 620 and 622 - 628) the process for validating the Identity of a user's Identification record associated with verified user documents stored In the system, comprises steps of (a) receiving the user's encrypted identification data such as biometric Identification data, a digital user identifier, a user's location data set, or the verified user documents containing AML, KYC or KYB information (step 622); (b) decrypting the received Identification data (step 624); (c) comparing the decrypted Identification data with user Identification data stored In the distributed ledger system (626); and (d) outputting a determination of validation or Invalidity regarding the received user’s identification data (step 628).
In another embodiment Illustrated in Figure 6 (see steps 630 and 632 - 640), the process for regulating access by an authorized entity to a user's verified documents on a distributed ledger, comprises steps of (a) activating via the one or more processors In any node on the network an algorithm configured for determining an authorized access level of the entity requesting access (step 632); (b) assigning the entity requesting access to the determined authorized access level (step 634); (o) receiving an encrypted digital user Identifier of the user associated with the verified document sought by the requesting entity (step 636); (d) decrypting the received digital user !dentifler(step 638); and (e) controlling the grant or denial of access depending on verification of a match of the received digital unique Identifier with biometric Identification data of the user associated with the verified document sought by the requesting entity (step 640).
Figure 7 Illustrates one embodiment of a structure of the system 700 of present Invention that provides a Cross Verification Trust Utility 710 for performing the processes described and Illustrated In Figure 6. The Cross Verification Trust Utility 710 - also called "CV 710" herein - may, for example, be embodied In an administrative trust utility providing the cross verification as a service. Briefly, In use an entity A, which has Verified ID-proof documents of a first user or client in Its database, can respond to a request from an entity B for ID verification of the first user by making available the ID proof documents of the first user to entity B If the first user (contacted by the entity B to agree to a smart contract regarding the approval for access by entity B to the ID record (s) held by entity A) approves the request for access. The system also accommodates the user's response to deny access as circumstances require it.
The cross verification trust utility CV 710 (which may also be called an ‘administrative company" 710 In some embodiments) may Include one or more servers 712 through 720, each containing programmed instructions in non-transltory memory (not shown) for performing the depicted functions. The cross verification trust utility CV 710 preferably Includes a distributed database network 730 formed by a distributed network of database elements 731 , 733, 735, 737, and 739 in this example, each database element being connectable to each other database element In the distributed database network 730. A database Is a collection of data organized to accommodate a variety of subject matter, arranged to enable convenient access and/or other processing functions. The distributed database network 730 (identically, a trust utility database 730) may be configured as a distributed ledger system as In a blockchain or as In an alternative that Is not a blockchain per se but a distributed ledger or other data network that may function at least in part In the manner of a blockchain. but which differs In significant ways. An example of the latter type of distributed ledger Is the so called R3 Corda. Other examples may Include Examples of a blockchain include the well-known Ethereum and HyperLedger Fabric.
Figure 7 depicts the modifications to the trust utility CV 710 according to the present Invention that provide the technological Improvement, heretofore not previously available, to a computer-implemented system operated according to specific new programmed Instructions that provides the novel advancement In the state of the art for cross verifying user or client Identification information, particularly among on-line entitles or on-line and physically-embodied entitles having a physical address at a real estate location, Figure 7 also deplete other entitles that typically Interact with the cross verification trust utility CV 710 through links or connections that are assigned numeric Identities In Figure 7. These numeric Identities represent paths or operations taking place In one example of a sequence for cross-verifying a user or client's digital unique identifier, user ID, biometric identification data, etc. These connections or linkages are labeled with the numerals 1 through 13 in Figure 7.
In one example depicted In Figure 7, a user or client 750, using a laptop computer configured for operation In the system 700 may, at some previous time have entered - I.e., registered - via path #1 his or her Identification information and personal, private, or business documents along with affirmation of their authenticity (verification) Into the records of an entity represented as "company A" 750. Thus company A 760 may be said to have "captured" the user's Information. This information may be processed In a computer system 762 of company A and stored In a database 764 linked to computer system 762 In company A 760. At a subsequent time, the sequence to be described begins at the "Enter" symbol 708 via the path #2, for example when an entity "Company B" 770, perhaps contacted by the user or client 750, or engaged In furthering a business activity or transaction of or associated with user or client 750. desires to verify the Identity of user or client 750, or Information provided by user or client 750, to company B 770 by communicating with company A, The processes employed In the system 700 to accomplish this objective are described and Illustrated in Figure 6. The sequence for carrying out these processes may proceed as depicted In Figure 7 and described as follows.
Company B 770 In path #3 forwards a request to CV 710 for obtaining ID-proof documents of user 750 along with providing a "requester verification address" from company B 770 to the CV 710 at server 712 to process the request, The request Is then sent by server 712 along path #4 to the user 750, with the "requester verification address" of company B, for approving company B’s request for the user's ID proof document, The user 750 can respond, In this example, In one of two ways, either by (a) submitting along path #5a the user's approval and the requester verification address" or by (b) submitting the biometric Identification information along path #5b to a biometric authentication server 714 in the CV 710 for authenticating the user's identity.
In alternative (a) the submission reaches server 716 along path # 6 to create a smart contract that may be signed with the user's private key (stored In the user or client's computer system 752) corresponding to an approver verification address of the user or client 750. The contract may Include an’approver address", which Is the user's verification address; and a“requester address’, which Is company B's verification address. In alternative (b) the user submits his or her biometric identification data along path #5b to the server 714 to perform a biometric authentication. Whether the user 750 submitted his or her biometric Identification Information along path 5b to server 714, and the biometric authentication Is affirmed (passes) along path #7, or a smart contract was created, signed with the user’s private key, and sent along path # 6 to server 716, the smart contract Is then sent along path #6 to the server 718, to forward the created and signed smart contract via path #9 to the validation network In the CV 710.
The validation network In the CV 710 may preferably be a distributed database 730 formed by a plurality of database nodes connected to each other In the network, Whether the distributed database 730 Is configured as a distributed ledger In a blockchaln-based ledger or a non-blockchain-based ledger, the distributed ledger operates to validate the smart contract and record the smart contract, to thereby release the verified documents of the user or client 750 to company B, followed by sending along path #10 the validated smart contract within CV 710 at server 720 to process the delivering of the user's Identification documents (denoted in Figure 7 by the numeric #1 1. The delivery of the user's or client's ID-proof documents proceeds along path # 12 to company A 760 for storage therein, e.g. database 764, Subsequently the ID-proof documents of the user or client 750 may be provided by company A 760 to fulfill the request of company B 770 via path # 13. This completes the exemplary process performed by the CV 710,
(112) The distributed ledger can vary from a general distributed database as follows: (a) the control of the read/write access is truly decentralized and not logically centralized as for other distributed databases, and as a result (b) there is an ability to secure transactions In competing environments, without trusted third parties, Distributed ledgers structures can be linear, such as blockchaln, or Incorporate Directed Acyclic Graphs (DAG), such as lota Tangle, Blockchaln, lota Tangle, and Hedera Hashgraph, are specific Instances of a distributed ledger, having respective predefined formats, algorithms, and access protocols,
(113) Blockchaln is a distributed ledger capable of chronologically storing cryptographic bltcoln electronic money (CBEM) transactions, In a blockchaln ledger, all CBEM.transactlons are periodically verified and stored in a "block" that Is linked to the preceding block via a cryptographic hash. The blockchaln ledger is publicly viewable, allowing the general public to view and keep track of CBEM transactions, Each network node can receive and maintain a copy of the blockchaln.
Cross verification requiring user or client approval frequently exists In private Industry, where some type of Identification verification must be used to confirm client approval, For example, other methods of verifying user Identity than those described above may include without limitation a text message (SMS) code, biometric authentication, voice recognition, security questions, going on-line to utilize bank verification (as when requested by a third party to verify one's identification), or any other type of Identity verification.
In an alternative embodiment or example of use, the present system may be used to facilitate the transfer of data without user or client approval when It is not required, This situation may arise when the request for ID verification originates from a government or a government agency to another government or agency, such as those cases when law or regulations do not permit the government or agency to request authorization from the user or client. A modified security process may be required for transferring documents when one of the entities Is an On-Line company to limit the information that might come Into the hands of one who succeeds In hacking Into the on-line company’s system. One example to provide limited access may proceed In two stages as follows, when the on-line company needs to confirm a client's identity. The on-line company may request a message Verified'’ or‘Not Verified" from the trusted party that Includes the client's name and a unique identification number, The unique Identification number may, for example, be randomly generated at the time the client completes a registration process at the trusted party's office, Even though the client may agree to transfer all of the Information requested, the on-line company may obtain partial information In stages.
In stage one, the requesting on-line party may receive only the client's name, unique Identification number, and a text message "Verified" or "Not Verified." In stage two, the requesting on-line party will request the remaining client information such as AML-type Identification information and/or KYC Information to confirm or authenticate the client's identity.
Although the present technology has been described in detail for the purpose of Illustration based on what Is currently considered to be the most practical and preferred Implementations, It is to be understood that such detail Is solely for that purpose and that the technology is not limited to the disclosed Im Cementations, but, on the contrary, Is Intended to cover modifications and equivalent arrangements that are within the spirit and scope of the appended claims. For example, it Is to be understood that the present technology contemplates that to the extent possible, one or more features of any Implementation can be combined with one or more features of any other Implementation.

Claims

Claims:
1. In a system of computer-implemented nodes connected In a network and configured by programmed Instructions stored In respective non-transltory memory units to form a distributed ledger, a process operational in each node for ensuring secure access, comprising the steps of: establishing a secure verification address for a digital user Identifier or biometric Identification data of a user related to verified documents of the user on the distributed ledger; validating the Identity of a user's identification record associated with verified user documents stoned In the distributed ledger of the system; and regulating access by an authorized entity to a user's verified documents on the distributed ledger.
2. In the system of claim 1 , the process of establishing a secure verification address further comprising the steps of: activating an Interface configured to add or delete data related to verified documents or biometric Identification data associated with the user; encrypting the digital user identifier or biometric identification data associated with the verified documents of the user entered into the Interface; associating the user's digital user Identifier with files In the distributed ledger containing the user's verified documents; and recording the digital user Identifier, the biometric identification data or the verified documents In the verification address.
3. In the system of Claim 1 , the process of validating the Identity of a user’s Identification record further comprising the steps of: receiving the user's encrypted identification data such as biometric identification data, a digital user identifier, a user’s location data set or the verified user documents containing AML, KYC or KYB information; decrypting the received identification data; comparing the decrypted identification data with user identification data stored in the distributed ledger system; and outputt!ng a determination of validation or invalidity regarding the received user's identification data.
4, The system of Claim 1 , the process of regulating access by an authorizing entity further comprising the steps of: activating via the one or more processors In any node on the network an algorithm configured for determining an authorized access level of the entity requesting access; assigning the entity requesting access to the determined authorized access level; receiving an encrypted digital user Identifier of the user associated with the verified document sought by the requesting entity; decrypting the received digital user identifier; and controlling the grant or denial of access depending on verification of a match of the received digital unique identifier with biometric identification data of the user associated with the verified document sought by the requesting entity.
5. In a system of computer-implemented nodes connected In a network and configured by programmed Instructions stored In respective non-transitory memory units to form a distributed ledger, a process for establishing a secure verification address for one of a digital user Identifier or biometric identification data of a user related to verified documents of the user on the distributed ledger, comprising the steps of; activating an interface configured to add or delete data related to verified documents or biometric identification data associated with the user; encrypting the digital user Identifier or biometric Identification data associated with the verified documents of the user entered Into the interface; associating the user’s digital user Identifier with files In the distributed ledger containing the user’s verified documents; and recording a verification address of the digital user Identifier, the biometric identification data or the verified documents.
6. The process of Claim 5, wherein further comprising the step of: controlling access to the user's verified documents or biometric identification data by setting an access level related to the digital user identifier, biometric Identification data, or user name.
7. The process of Claim 5, wherein the biometric Identification data comprises: data selected from the group consisting of an Image or hash of a finger print, an Iris or retina, a voice print, a face, a data set of behavioral information, and a combination of the foregoing.
8. The process of Claim 5, wherein the step of encrypting comprises the step of; encrypting the user’s digital user Identifier, biometric identification data or user name associated with the verified documents of the user using a private key and a public key; wherein the private key Is retained on a user device such as a SIM card or In a data file; and the public key is retained on a server In the system.
9. The process of Claim 5, wherein the step of associating comprises the step of: validating in the distributed ledger the association between the user's verification address and the requesters verification address.
10. The process of Claim 5, wherein the step of recording comprises the step of: staring the verification address of the digital user Identifier, the biometric identification data or the verified documents In each node of the distributed ledger.
11. In a system of computer-implemented nodes connected in a network and configured by programmed Instructions stored In respective non-transitory memory units, a process for validating the identity of a user's identification record associated with verified user documents stored In the system, comprising the steps of: receiving the user's encrypted Identification data such as biometric Identification data, a digital user identifier, a users location data set, or the verified user documents containing AML, KYC or KYB Information; decrypting the received Identification data; comparing the decrypted identification data with user Identification data stored In the distributed ledger system; and outputting a determination of validation or Invalidity regarding the received user's Identification data.
12. The process of Claim 11, wherein the biometric identification data comprises: data selected from the group consisting of an Image or hash of a finger print, an Iris or retina, a voice print, a face, a data set of behavioral information, and a combination of the foregoing,
13. The process of Claim 11 , wherein the AML Information comprises: one or more of anti-money-launderlng Information selected from the group consisting of a user's Identification card, driver’s license, passport, utility bill, and other documents that state proof of Identification and address.
14. The process of Claim 11 , wherein the KYC Information comprises: one or more of know your customer Information selected from the group consisting of a user's mortgage loan documents, bank statements, Insurance documents, investment account statements or other financial documents, medical records, and documents of personal data that belongs to the uaer.
15. The process of Claim 11 , wherein the KYB Information comprises: one or more of know your business Information selected from the group consisting of certificate and articles of Incorporation, bank statement annual report, and financial details of transactions.
16. In a system of computer-implemented nodes having one or more processors connected In a network and configured by programmed instructions stored In respective non-transltory memory units, a process for regulating access by an authorized entity via one of a multiple of personal data access levels to a user's verified documents on a distributed ledger, comprising the steps of: activating via the one or more processors In any node on the network an algorithm configured for determining the one of a multiple of authorized access levels of the entity requesting access; assigning the entity requesting access to the determined authorized access level; receiving an encrypted digital user identifier of the user associated with the verified document sought by the requesting entity; decrypting the received digital user identifier, and controlling the grant or denial of access depending on verification of a match of the received digital user Identifier with user Identification Information or biometric Identification data of the user associated with the verified document sought by the requesting entity.
17. The process of Claim 16, wherein the step of receiving comprises the steps of: entering the received encrypted digital user identifier into a temporary storage location; and confirmlng the received digital user identifier is encrypted with a public/private key system. 18, The process of Claim 16, wherein the step of decrypting comprises the steps of: applying the public key and the private key Information to the contents of the temporary storage location; and replacing the contents of the temporary storage location with the decrypted digital user Identifier. 19, The process of Claim 16, wherein the step of controlling the grant or denial of access comprises the steps of: reading the digital user identifier after decrypting; and granting access to the verified document if the identity of the requesting entity Is verified; or denying access to the verified document if the Identity of the requesting entity Is not verified.
PCT/US2018/029350 2018-04-24 2018-04-25 Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features WO2019209286A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US15/961,603 2018-04-24
US15/961,603 US10484178B2 (en) 2016-10-26 2018-04-24 Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features

Publications (1)

Publication Number Publication Date
WO2019209286A1 true WO2019209286A1 (en) 2019-10-31

Family

ID=68295686

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2018/029350 WO2019209286A1 (en) 2018-04-24 2018-04-25 Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features

Country Status (1)

Country Link
WO (1) WO2019209286A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113569298A (en) * 2021-07-23 2021-10-29 徐丹梅 Identity generation method and identity system based on block chain

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170286717A1 (en) * 2016-04-05 2017-10-05 Vchain Technology Limited Method and system for managing personal information within independent computer systems and digital networks
US20170300978A1 (en) * 2016-04-13 2017-10-19 Paypal, Inc. Public ledger authentication system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170286717A1 (en) * 2016-04-05 2017-10-05 Vchain Technology Limited Method and system for managing personal information within independent computer systems and digital networks
US20170300978A1 (en) * 2016-04-13 2017-10-19 Paypal, Inc. Public ledger authentication system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113569298A (en) * 2021-07-23 2021-10-29 徐丹梅 Identity generation method and identity system based on block chain

Similar Documents

Publication Publication Date Title
US10484178B2 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
US20180343120A1 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
US11030621B2 (en) System to enable contactless access to a transaction terminal using a process data network
US10749681B2 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
US20220277307A1 (en) Systems and methods for personal identification and verification
US20220052852A1 (en) Secure biometric authentication using electronic identity
EP3721578B1 (en) Methods and systems for recovering data using dynamic passwords
US20210383377A1 (en) Decentralized identity verification platforms
US10902425B2 (en) System and method for biometric credit based on blockchain
CN109791660A (en) Data protection system and method
US11100497B2 (en) Risk mitigation for a cryptoasset custodial system using a hardware security key
US11501291B2 (en) Cryptoasset custodial system using encrypted and distributed client keys
US20210049588A1 (en) Systems and methods for use in provisioning tokens associated with digital identities
WO2019209291A1 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
AU2018100478A4 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
US20210217024A1 (en) System and Method of Consolidating Identity Services
WO2019209286A1 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
US20210110357A1 (en) Digital notarization intermediary system
KR20210041984A (en) The block chain private key generation method using smart devices with KYC data and biometric information
JP7324941B2 (en) Financial transaction system and method
US20220239490A1 (en) Information processing device and information processing method
KR20240014317A (en) The ownership proof system of personal signature through NFT issuance about personal signature data

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18916539

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22.02.2021)

122 Ep: pct application non-entry in european phase

Ref document number: 18916539

Country of ref document: EP

Kind code of ref document: A1