Identity management system
First Claim
1. A method of validating a user identity in an e-commerce transaction using an authoritative identity source, the method comprising:
- scanning a biometric signature into a user device;
registering the biometric signature with an authoritative identity source;
generating, at the identity source, an encrypted user identity element;
transmitting the encrypted user identity element from the authoritative identity source to the user device;
storing, at the user device, the encrypted user identity element in a secure enclave;
transmitting an identity request from the third party to the user device;
unlocking the secure enclave of the user device;
transmitting the encrypted user identity element from the user device to a third party;
using the unlocked secure enclave, transmitting an identity validation request including the encrypted user identity element from the third party to the identity source;
determining, at the identity source, if the identity of the user device can be confirmed;
andtransmitting from the identity source to the third party whether during the determining the identity of the user device was confirmed or not confirmed.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method of validating an identity of a user device is disclosed that includes registering a biometric signature with an authoritative identity source, transmitting an encrypted user identity element from the authoritative identity source to a user device, sending an identity request from a third party entity to the user device, transmitting the encrypted user identity element from the user device to the third party, sending an identity validation request from the third party to the authoritative identity source, transmitting a communication from the authoritative identity request to the third party entity, and informing the third party entity if the identity of the user is confirmed.
29 Citations
20 Claims
-
1. A method of validating a user identity in an e-commerce transaction using an authoritative identity source, the method comprising:
-
scanning a biometric signature into a user device; registering the biometric signature with an authoritative identity source; generating, at the identity source, an encrypted user identity element; transmitting the encrypted user identity element from the authoritative identity source to the user device; storing, at the user device, the encrypted user identity element in a secure enclave; transmitting an identity request from the third party to the user device; unlocking the secure enclave of the user device; transmitting the encrypted user identity element from the user device to a third party; using the unlocked secure enclave, transmitting an identity validation request including the encrypted user identity element from the third party to the identity source; determining, at the identity source, if the identity of the user device can be confirmed; and transmitting from the identity source to the third party whether during the determining the identity of the user device was confirmed or not confirmed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An identity management system comprising:
-
a biometric module, within a user device, that scans a biometric signature into the user device; a registration component that registers at least one biometric signature with an authoritative identity source; a secure element generation component that generates an encrypted user identity element; wherein the authoritative identity source transmits the encrypted user identity element to the user device; a secure enclave module, within the user device, operative to store the encrypted user identity element; a third party operative to transmit an identity request to the user device; wherein the biomedical module unlocks the secure enclave module; wherein the user device transmits the encrypted user identity element from the user device to a third party; using the unlocked secure enclave module, transmitting an identity validation request including the encrypted user identity element from the third party to the identity source an identity request component that allows third party entities to request proof of identity from the electronic device of the user of the electronic device; and a validation component that allows the third party entities to validate the identity of the user of the electronic device via the authoritative identity source. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computer-readable storage device storing executable instructions that, in response
to execution, cause a system comprising a processor to perform operations comprising: -
scanning a biometric signature into a user device; registering the biometric signature with an authoritative identity source; generating, at the authoritative identity source, an encrypted user identity element transmitting the encrypted user identity element from the authoritative identity source to the user device; storing, at the user device, the encrypted user identity element in a secure enclave; unlocking the secure enclave of the user device; transmitting the encrypted user identity element from the user device to the third party entity; using the unlocked secure enclave, sending an identity validation request including the encrypted user identity element from the third party entity to the authoritative identity source; and confirming the identity of the user to the third party entity from the authoritative identity source. - View Dependent Claims (19, 20)
-
Specification