Method and system for identity verification for e-transactions
First Claim
1. A method for personal identification and authentication, comprising the steps of:
- a) creating a first central database of certified personal information;
b) creating a second central database to store digital identification badge data;
c) collecting over the Internet user personal information from a user requesting a digital identification badge;
d) transferring said user personal information to a verification station over the Internet using a secure transmission protocol;
e) cross-referencing said user personal information with said certified personal information to certify, deny, or determine inconclusive evidence for creating a digital identification badge;
f) if a digital identification badge is not certified in step e), i) storing said user personal information in said second central database;
ii) notifying said user of badge status with instructions for corrective action;
g) if a digital identification badge is certified in step e), i) creating a digital identification badge;
ii) storing personal information in said digital identification badge;
iii) storing said digital identification badge in said second central database;
iv) providing over the Internet using said secure transmission protocol, access to said encrypted digital identification badge to said user for use in facilitating transactions and purchases over the Internet.
0 Assignments
0 Petitions
Accused Products
Abstract
A user of a verification system registers directly at the verification system web site or by proxy at the time of engaging in an e-transaction through a vendor'"'"'s web site. Upon registration, the user provides personal information in a secure environment. The verification system checks the database to cross-reference the user-provided information with the government-certified, or non-government certified data stored in the verification system databases. The verification system then creates a unique identifier and a digital identification badge. The user inputs the unique identifier into the system at the start of an e-transaction and the digital identification badge is securely transmitted from the verification system to the vendor in response to the unique identifier. The vendor decrypts the digital identification badge to confirm that the user is authorized to make a particular e-transaction.
-
Citations
40 Claims
-
1. A method for personal identification and authentication, comprising the steps of:
-
a) creating a first central database of certified personal information;
b) creating a second central database to store digital identification badge data;
c) collecting over the Internet user personal information from a user requesting a digital identification badge;
d) transferring said user personal information to a verification station over the Internet using a secure transmission protocol;
e) cross-referencing said user personal information with said certified personal information to certify, deny, or determine inconclusive evidence for creating a digital identification badge;
f) if a digital identification badge is not certified in step e), i) storing said user personal information in said second central database;
ii) notifying said user of badge status with instructions for corrective action;
g) if a digital identification badge is certified in step e), i) creating a digital identification badge;
ii) storing personal information in said digital identification badge;
iii) storing said digital identification badge in said second central database;
iv) providing over the Internet using said secure transmission protocol, access to said encrypted digital identification badge to said user for use in facilitating transactions and purchases over the Internet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A personal authentication/identification method for creating a digital identification badge, comprising the steps of:
-
a) providing a central information database of certified personal information;
b) creating a central badge database for the storing personal information of users and incorruptible digital identification badges;
c) receiving a request for a digital identification badge from a user, said request containing personal information from said user;
d) encrypting said request for a digital identification badge;
e) transferring said encrypted request to a verification site;
f) checking said personal information in said request with said certified personal information to determine whether said user is eligible for a digital identification badge;
g) storing said personal information in said central badge database;
h) if said user is eligible for a digital identification badge, i) creating a digital identification badge for said user;
ii) storing said digital identification badge for said user;
iii) encrypting certified personal information in said digital identification badge; and
,iv) providing over the Internet access to said encrypted digital identification badge to said user for use in facilitating transactions and purchases over the Internet. - View Dependent Claims (11, 12, 13, 14, 17, 18, 19, 20, 21, 22, 23, 25, 26, 27, 28, 29)
-
-
15. A method of buyer identity verification for e-commerce, comprising the steps of:
-
a) providing a database of certified personal data;
b) receiving buyer-submitted personal data and a request for a unique identification from a buyer;
c) validating said buyer-submitted personal data with said certified personal data;
d) if said buyer-submitted personal data validates, i) creating a unique identification for said buyer; and
ii) storing said unique identification in anticipation of confirming said unique identification to vendors servicing said buyer.
-
-
16. A process for verification of the identity of a first party in an electronic transaction with a second party, said process comprising the steps of:
-
a) submitting by said first party to said second party a non-governmental third party certificate of said identity, said certificate including personal information of said first party and certified information provided by said third party; and
subsequentlyb) comparing by said second party or its proxy said personal information to personal information provided by said first party as a component of said transaction; and
c) comparing by said second party or its proxy of said certificate information to information provided by said third party for said first party;
said steps performed during substantially a single session of communication.
-
-
24. A system for identity verification of a first party by a second party in a transaction, comprising:
-
a) means for submitting by the first party to the second party an identity certificate having personal information of the first party and certified information provided by a third party;
b) personal information comparing means for comparing by said second party said identity certificate personal information to personal information provided by the first party; and
c) certificate information comparing means for comparing by said second party said identity certificate third party information to information provided by the third party for the first party, whereby verification of said identity certificate personal information and said identity certificate certified information verifies to said second party the identity of the first party.
-
-
30. A system for personal identity verification, comprising:
-
a first secure link between a vendor and a customer to be used by said customer for transmitting personal information to said vendor;
a verification system having a database of certified personal information;
a second secure link between said vendor and said verification system;
a database builder having links to at least one source of certified personal information, said database builder providing periodic updates to said database of certified personal information; and
a data comparison subsystem for comparing said customer personal information with said certified personal information, said verification system issuing a customer badge if said customer personal information is verified. - View Dependent Claims (31, 32, 33, 34, 35, 38, 40)
-
-
36. A verification system for verifying identity (of which age is a subset of) of persons for Internet-commerce, comprising:
-
a secure link for use by vendors and customers for transmitting customer personal information to the verification system;
a database of certified personal information;
a verification processor for comparing customer personal information transmitted over said secure link with said certified personal information, said verification processor for generating a unique identifier in response to verification of said customer personal information; and
a database of storing said transmitted personal information and said unique identifier for use in authorizing Internet-commerce transactions by said customer.
-
-
37. A system for a vendor to verify identity of a customer, comprising:
-
means for receiving personal information from the customer;
means for establishing a secure link to a verification station;
means for forwarding said received personal information over said secure link;
means for receiving verification from said verification station in response to said received personal information, whereby the vendor approves a transaction with the customer in response to receiving said verification.
-
-
39. A verification system for identity verification comprising:
-
a first database of user data to store user personal information and associated unique identifiers and digital identification badges;
a second database to store certified data; and
a processor to build the first database by verifying user data with certified data and to created a unique identifier and a digital identification badge in response to verified user data.
-
Specification