USER CONTROLLED IDENTITY AUTHENTICATION
First Claim
1. A system, method for user controlled identity authentication comprising:
- A) At least one central computer having at least one user within a user database having user data and at least one service provider within a service provider database with service provider data;
B) At least one service provider having electronic communication with the central computer;
C) At least one user having electronic devices capable of communications with the central computer and service provider;
D) Providing a user with a set of controls within the central computer to customize privacy, security and authentication of the user data;
E) At least one form of authentication that may be what a person knows, has or is;
0 Assignments
0 Petitions
Accused Products
Abstract
A system, method for user controlled identity authentication comprising: a) At least one central computer having at least one user within a user database having user data and at least one service provider within a service provider database with service provider data; b) At least one service provider having electronic communication with the central computer; c) At least one user having electronic devices capable of communications with the central computer and service provider; e) Providing a user with a set of controls within the central computer to customize privacy, security and authentication of the user data; f) Providing a set of access rights within the service provider data of the central computer having a set of transaction rules for the service provider.
27 Citations
20 Claims
-
1. A system, method for user controlled identity authentication comprising:
-
A) At least one central computer having at least one user within a user database having user data and at least one service provider within a service provider database with service provider data; B) At least one service provider having electronic communication with the central computer; C) At least one user having electronic devices capable of communications with the central computer and service provider; D) Providing a user with a set of controls within the central computer to customize privacy, security and authentication of the user data; E) At least one form of authentication that may be what a person knows, has or is; - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system, method for user controlled identity authentication comprising:
-
A) At least one central computer having at least one user within a user database having user data and at least one service provider within a service provider database with service provider data; B) At least one service provider having electronic communication with the central computer; C) At least one user having electronic devices capable of communications with the central computer and service provider; D) Providing a user with a set of controls within the central computer to customize privacy, security and authentication of the user data; E) Providing a set of access rights within the service provider data of the central computer having a set of transaction rules for the service provider; F) At least one form of authentication that may be what a person knows, has or is; G) At least one service provider with communications with a resource; - View Dependent Claims (17, 18, 19, 20)
-
Specification