Personal identity data management
First Claim
1. A method of managing an individuals personal identity data, the method comprising the steps of:
- 1) sharing of public digital signature keys and hashing functions between a Personal Identity Management Service and a Personal Identity Data Repository whereby reports concerning an individual'"'"'s personal identity information provided by said Repository to said Personal Identity Management Service may be authenticated and changes to said reports detected;
2) said individual establishing his own Personal Identity Data Archive by capturing his fingerprints, photograph and retinal scan at a Biometric Capture Services Provider and requesting an initial fingerprint-based criminal history background check be performed on said individual;
3) said Personal Identity Management Service processing said individual'"'"'s request for a criminal history background check;
4) enabling said individual to review the results of said criminal history background check for accuracy and completeness and to correct erroneous and incomplete information;
5) enabling said individual to add criminal history background check results to said Personal Identity Data Archive;
6) enabling said individual to authorize the release of their criminal history background check results from their Personal Identity Data Archive to at least one end-user;
7) enabling said at least one end-user to access at least a portion of said background check results; and
to validate that said at results were based upon the fingerprints of said individual by;
(a) capturing validation fingerprints from the individual or (b) viewing the photograph taken when the fingerprints were captured;
8) enabling said individual to request said Personal Identity Management Service to submit additional personal identity data to said Personal Identity Data Archive and said Personal Identity Data Repository;
9) enabling said individual to review said additional personal identity data submitted to said Personal Identity Data Archive for accuracy and completeness and to correct erroneous and incomplete information;
10) enabling said individual to add additional personal identity data to said Personal Identity Data Archive;
11) enabling said individual to confirm that said additional personal identity data is complete and accurate and to authorize said Personal Identity Management Service to release at least a portion of said additional personal identity data in said Personal Identity Data Archive to at least one end-user;
12) permitting said at least one end-user access to said additional personal identity data released by said Personal Identity Management Service;
13) said individual retrieving their Personal Identity Data Archive access code based upon said Biometric Capture Service Provider'"'"'s submittal of fingerprint and retinal scan confirmation of said individual'"'"'s identity; and
14) enabling said individual to request additional criminal history background checks of state and FBI repositories and name-based checks of private sector criminal history databases.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods and apparatus for personal identity data management permit individuals to manage their criminal background, credit history, employment, demographic and educational information, for example, to establish their credentials and to help protect their good names. All access to this personal identity data, including the biometrics that uniquely establish the individuals'"'"' identity, is under the personal control of the individuals, with access limited to others only with their specific authorization. The subject systems, methods and apparatus include at least two separate archives that store encrypted data about individuals that can be accessed only via the individuals'"'"' biometrics specific to the archives and unique Identification Numbers. The Identification Numbers are encrypted when they are associated with the individuals'"'"' demographic data, which includes their names, Social Security Numbers and the Unique Identifiers assigned by the system to each of the individuals. Public/private key encryption is used to encrypt the Personal Identity Data maintained in the archives and the Identification Numbers maintained in a Personal Identity Management Service configuration application server that links the rest of the system to the archives. To permit the private keys to be securely retained for use in regenerating a. Smartcard in case of loss or damage, separate segments of the private key are stored on different servers each of which requires submittal of a different biometric, which must match the biometric associated with the private key segment.
-
Citations
1 Claim
-
1. A method of managing an individuals personal identity data, the method comprising the steps of:
- 1) sharing of public digital signature keys and hashing functions between a Personal Identity Management Service and a Personal Identity Data Repository whereby reports concerning an individual'"'"'s personal identity information provided by said Repository to said Personal Identity Management Service may be authenticated and changes to said reports detected;
2) said individual establishing his own Personal Identity Data Archive by capturing his fingerprints, photograph and retinal scan at a Biometric Capture Services Provider and requesting an initial fingerprint-based criminal history background check be performed on said individual;
3) said Personal Identity Management Service processing said individual'"'"'s request for a criminal history background check;
4) enabling said individual to review the results of said criminal history background check for accuracy and completeness and to correct erroneous and incomplete information;
5) enabling said individual to add criminal history background check results to said Personal Identity Data Archive;
6) enabling said individual to authorize the release of their criminal history background check results from their Personal Identity Data Archive to at least one end-user;
7) enabling said at least one end-user to access at least a portion of said background check results; and
to validate that said at results were based upon the fingerprints of said individual by;
(a) capturing validation fingerprints from the individual or (b) viewing the photograph taken when the fingerprints were captured;
8) enabling said individual to request said Personal Identity Management Service to submit additional personal identity data to said Personal Identity Data Archive and said Personal Identity Data Repository;
9) enabling said individual to review said additional personal identity data submitted to said Personal Identity Data Archive for accuracy and completeness and to correct erroneous and incomplete information;
10) enabling said individual to add additional personal identity data to said Personal Identity Data Archive;
11) enabling said individual to confirm that said additional personal identity data is complete and accurate and to authorize said Personal Identity Management Service to release at least a portion of said additional personal identity data in said Personal Identity Data Archive to at least one end-user;
12) permitting said at least one end-user access to said additional personal identity data released by said Personal Identity Management Service;
13) said individual retrieving their Personal Identity Data Archive access code based upon said Biometric Capture Service Provider'"'"'s submittal of fingerprint and retinal scan confirmation of said individual'"'"'s identity; and
14) enabling said individual to request additional criminal history background checks of state and FBI repositories and name-based checks of private sector criminal history databases.
- 1) sharing of public digital signature keys and hashing functions between a Personal Identity Management Service and a Personal Identity Data Repository whereby reports concerning an individual'"'"'s personal identity information provided by said Repository to said Personal Identity Management Service may be authenticated and changes to said reports detected;
Specification