×

Systems and methods for distributed identity verification

  • US 10,237,259 B2
  • Filed: 02/28/2017
  • Issued: 03/19/2019
  • Est. Priority Date: 02/29/2016
  • Status: Active Grant
First Claim
Patent Images

1. An identity management method for controlling an exchange of data bundles by an identity provider server, the method comprising:

  • receiving, at the identity provider server, a first request from a user agent server, the first request identifying one or more claim categories;

    generating, at the identity provider server, a data bundle at a first time in response to the first request, the data bundle identifying one or more attributes associated with a user related to the user agent server, wherein each attribute corresponds to a claim category of the one or more claim categories identified in the first request and a corresponding value;

    the identity provider server encrypting the data bundle with a user encryption key (UEK);

    transmitting, by the identity provider server, the data bundle to the user agent server;

    generating a first entry;

    signing the first entry with an identity provider private key corresponding to the identity provider server to generate a signed first entry;

    generating a second entry; and

    signing the second entry with a second key to generate a signed second entry, the second key being derived from the identity provider private key;

    at a first ledger;

    verifying a signature of the identity provider server on the first entry to generate a first signature verification result;

    storing the first entry in the first ledger based on the first signature verification result; and

    transmitting a first entry address to the identity provider server, the first entry address identifying an address of the first entry in the first ledger;

    at a second ledger;

    verifying a signature of the identity provider server on the second entry to generate a second signature verification result;

    storing the second entry in the second ledger based on the second signature verification result; and

    transmitting a second entry address to the identity provider server, the second entry address identifying an address of the second entry in the second ledger; and

    at one or more auditor servers;

    receiving a first ledger identifier identifying the first ledger storing the first entry, a second ledger identifier identifying the second ledger storing the second entry, the first entry address and the second entry address;

    accessing the first entry based on the first ledger identifier and the first entry address;

    verifying the signature of the identity provider server on the first entry;

    accessing the second entry based on the second ledger identifier and the second entry address;

    verifying the signature of the identity provider server on the second entry;

    generating a confirmation entry for each of the one or more auditor servers, wherein each confirmation entry is based on successful verification of the signature of the identity provider server on the first entry and the signature of the identity provider server on the second entry; and

    linking the first entry address to the second ledger identifier and the second entry address to the first ledger identifier based on the confirmation entry of the one or more auditor servers,wherein the identity provider server, the user agent server, the first ledger, the second ledger, and the one or more auditor servers are executed by one or more computing devices and communicate via a data communication network.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×