Method and system for consumer based access control for identity information
First Claim
1. A computer implemented method for access control for identity information requests, the method comprising:
- configuring specific policies for a policy engine in an identity service entity in a Joint Identity and Information Service Network (JIISN) server framework which manages a plurality of identity service entities, wherein the specific policies may include real-time notification, real-time authorization, lock for duration of time and identifiers proving the identity of the authorizing party including contextual factors of the authorizing party;
configuring the JIISN for detection and verification of identity information requests against an active directory of the plurality of identity service entities and wherein the JIISN server framework includes at least one of the plurality of identity service entities who have been opted in by an identity information owner for notification, multi factor authentication and authorization of at least one of the identity information requests and wherein the at least one of the plurality of identity service entities has a real time authorization plug-in for communicating with a real time authorization server;
receiving at the at least one of the plurality of identity service entities the at least one identity information request from a requesting entity which confirms a unique identification and reference identity of the identity information owner;
processing and analyzing for abnormalities the at least one identity information request in the JIISN server framework;
computing the required action based on the specific policies;
communicating with the real time authorization server which identifies an authorizing party based on the specific policies and communicates with the authorizing party in real time through an out of band notification; and
receiving an authorization or decline of the at least one identity information request from the real time authorization server forwarded from the authorizing party.
4 Assignments
0 Petitions
Accused Products
Abstract
A computer implemented system and method for a consumer based access control for identity information. The method and system involve receiving at an identity organization a request for registration and verification of the identity information and configuring a specific user selected policy for notification and authorization of such identity requests of a desired (or intended) identity service (or plurality of services) associated with the targeted user identification. Next, processing the request in a Joint Identity Information Service Network (JIISN) server framework for the detection and verification of a request against an active directory of users or organizations who have opted in for notification; computing the required action based on the configuration of the policies in one of the group consisting of: a JISN policy engine and a user remote mobile control system; communicating with a real time authorization server (e.g., eGuardian™) which in part identifies the registered authorizing party including delivering notification for the identity services requested by the user based on the JISN policy engine setting through the agency or organization Identity System Service (e.g., It'"'"'sMe™ service) and alternatively user mobile rules; automatic rejection (or lock down of the Identity or data), automatic approval or real time authorization delivering the request authorization through a secure communication network back to a joint identity network service comprised of a plurality of government or private identity and credit report services; and determining if a user is to be verified using a second or multi factor authenticating service.
91 Citations
18 Claims
-
1. A computer implemented method for access control for identity information requests, the method comprising:
-
configuring specific policies for a policy engine in an identity service entity in a Joint Identity and Information Service Network (JIISN) server framework which manages a plurality of identity service entities, wherein the specific policies may include real-time notification, real-time authorization, lock for duration of time and identifiers proving the identity of the authorizing party including contextual factors of the authorizing party; configuring the JIISN for detection and verification of identity information requests against an active directory of the plurality of identity service entities and wherein the JIISN server framework includes at least one of the plurality of identity service entities who have been opted in by an identity information owner for notification, multi factor authentication and authorization of at least one of the identity information requests and wherein the at least one of the plurality of identity service entities has a real time authorization plug-in for communicating with a real time authorization server; receiving at the at least one of the plurality of identity service entities the at least one identity information request from a requesting entity which confirms a unique identification and reference identity of the identity information owner; processing and analyzing for abnormalities the at least one identity information request in the JIISN server framework; computing the required action based on the specific policies; communicating with the real time authorization server which identifies an authorizing party based on the specific policies and communicates with the authorizing party in real time through an out of band notification; and receiving an authorization or decline of the at least one identity information request from the real time authorization server forwarded from the authorizing party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer implemented method for access control for data commodity transfer requests, the method comprising:
-
configuring specific policies for a policy engine in an identity service entity of a Joint Identity and Information Service Network (JIISN) server framework which manages a plurality of identity service entities, wherein the specific policies may include real-time notification, real-time authorization, lock for duration of time and identifiers proving the identity of the authorizing party including contextual factors of the authorizing party; configuring the JIISN for detection and verification of data commodity requests against an active directory of the plurality of identity service entities, wherein the JIISN server framework includes at least one of the plurality of identity service entities who have been opted in by a data commodity owner for notification, multi factor authentication and authorization of at least one of the data commodity requests and wherein the at least one of the plurality of identity service entities has a real time authorization plug-in for communicating with a real time authorization server; receiving at the at least one of the plurality of service entities the at least one data commodity request from a requesting entity which confirms a unique identification and reference identity of the data commodity owner; processing and analyzing for abnormalities the at least one data commodity request in the JIISN server framework; computing the required action based on the specific policies; communicating with the real time authorization server which identifies an authorizing party based on the specific policies and communicates with the authorizing party in real time through an out of band notification; and receiving an authorization or decline of the at least one data commodity request from the real time authorization server forwarded from the authorizing party. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification