Systems and methods for sharing verified identity documents
First Claim
1. A method for sharing identity information, comprising:
- at one or more devices with one or more processors and memory storing one or more programs for execution by the one or more processors;
obtaining identity information of a user;
facilitating storing, at a first device of the one or more devices, a document that includes the identity information of the user, wherein the document is stored in one or more encrypted containers;
receiving, from a second device of a third party that is distinct from the first device and a client device of the user, a request for at least a part of the identity information of the user;
sending a request to the client device requesting authorization to release the requested part of the identity information to the third party;
receiving, from the client device, authorization to release the requested part of the identity information to the third party; and
in response to receiving the authorization, facilitating sending of the requested part of the identity information to the third party.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for sharing identity information is disclosed. The method is performed at one or more devices. The one or more devices obtain identity information of a user and facilitate storing, at a first device, a document that includes the identity information of the user. The document is stored in one or more encrypted containers. The one or more devices receive, from a second device of a third party, a request for at least a part of the identity information of the user. A request is sent to a client device, requesting authorization to release the requested part of the identity information to the third party. Device authorization to release the requested part of the information to the third party is received from the client device. In response to receiving the authorization, the one or more devices facilitate sending the requested part of the information to the third party.
-
Citations
20 Claims
-
1. A method for sharing identity information, comprising:
-
at one or more devices with one or more processors and memory storing one or more programs for execution by the one or more processors; obtaining identity information of a user; facilitating storing, at a first device of the one or more devices, a document that includes the identity information of the user, wherein the document is stored in one or more encrypted containers; receiving, from a second device of a third party that is distinct from the first device and a client device of the user, a request for at least a part of the identity information of the user; sending a request to the client device requesting authorization to release the requested part of the identity information to the third party; receiving, from the client device, authorization to release the requested part of the identity information to the third party; and in response to receiving the authorization, facilitating sending of the requested part of the identity information to the third party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An electronic device, comprising:
-
one or more processors; memory; and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs including instructions for; obtaining identity information of a user; facilitating storing, at the electronic device, a document that includes the identity information of the user, wherein the document is stored in one or more encrypted containers; receiving, from a second device of a third party that is distinct from the electronic device and a client device of the user, a request for at least a part of the identity information of the user; sending a request to the client device requesting authorization to release the requested part of the identity information to the third party; receiving, from the client device, authorization to release the requested part of the identity information to the third party; and in response to receiving the authorization, facilitating sending of the requested part of the identity information to the third party.
-
-
14. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by one or more devices, cause the one or more devices to:
-
obtain identity information of a user; facilitate storing, at a first device of the one or more devices, a document that includes the identity information of the user, wherein the document is stored in one or more encrypted containers; receive, from a second device of a third party that is distinct from the first device and a client device of the user, a request for at least a part of the identity information of the user; send a request to the client device requesting authorization to release the requested part of the identity information to the third party; receive, from the client device, authorization to release the requested part of the identity information to the third party; and in response to receiving the authorization, facilitate sending of the requested part of the identity information to the third party. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification