Methods and systems for a digital trust architecture
First Claim
1. A system implementing a digital trust architecture, comprising:
- one or more computer processors configured to;
receive, from a network, a first item of user identity information from a user computer,receive a second item of user identity information over the network from an in-person verification system,verify a user account based on the first item of user identity information and the second item of user identity information,provision the user account to a user associated with the user computer based on the verification and the first and second items of user identity information,generate a public and private key associated with the user,generate an email message to be sent to a recipient from the user,sign the email message using the private key,transmit the email message over the network to a recipient computer associated with the recipient,select sensitive data,grant permission to access the selected sensitive data,revoke access to the selected sensitive data,receive records from the user,attach the received records to the email message, andadd the e-mail message to the block chain; and
a hardware memory electronically coupled to the one or more computer processors and configured to store the first and second items of user identify information received by the one or more computer processors.
1 Assignment
0 Petitions
Accused Products
Abstract
In some aspects, methods and systems for a digital trust architecture are provided. In some aspects, the architecture includes a user account provisioning process. The provisioning process may make use of in person verifications of some personal information to ensure authenticity of the user information. Once the authenticity of user information is established, an account may be created. The user account may include a user email account, with integrated access to digital certificates linked to the user account. Account creation may also automatically publish the new user'"'"'s public key in a publicly accessible directory, enabling encrypted email information to be easily sent to the new user.
-
Citations
14 Claims
-
1. A system implementing a digital trust architecture, comprising:
-
one or more computer processors configured to; receive, from a network, a first item of user identity information from a user computer, receive a second item of user identity information over the network from an in-person verification system, verify a user account based on the first item of user identity information and the second item of user identity information, provision the user account to a user associated with the user computer based on the verification and the first and second items of user identity information, generate a public and private key associated with the user, generate an email message to be sent to a recipient from the user, sign the email message using the private key, transmit the email message over the network to a recipient computer associated with the recipient, select sensitive data, grant permission to access the selected sensitive data, revoke access to the selected sensitive data, receive records from the user, attach the received records to the email message, and add the e-mail message to the block chain; and a hardware memory electronically coupled to the one or more computer processors and configured to store the first and second items of user identify information received by the one or more computer processors. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of implementing a digital trust architecture, comprising:
-
receiving, from a network, a first item of user identity information from a user computer; receiving a second item of user identity information over the network from an in-person verification system; verifying a user account based on the first item of user identity information and the second item of user identity information; provisioning the user account to a user associated with the user computer based on the verification and the first and second items of user identity information; generating a public and private key associated with the user; generating an email message to be sent to a recipient from the user; signing the email message using the private key; transmitting the email over the network to a recipient computer associated with the recipient; selecting sensitive data; granting permission to access the selected sensitive data; revoking access to the selected sensitive data; receiving records from the user; attaching the received records to the email message; and adding the email message to the block chain. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification