SYSTEM AND METHOD FOR CREATING AND ADMINISTERING ELECTRONIC CREDENTIALS
First Claim
1. A method, comprising:
- receiving, by a computer based system and via an identity broker, first identity information from a first identity provider,wherein the first identity information includes a first electronic identification instrument;
generating, by the computer based system and via a token engine, a first token;
associating, by the computer based system, the first token and the first electronic identification instrument;
provisioning, by the computer based system and via a credential engine, a first electronic identification instrument and a first digital token associated with the first electronic identification instrument to a wallet application of a user device;
receiving, by the computer based system and via the identity broker, second identity information from a second identity provider; and
provisioning, by the computer based system and via the credential engine, a second electronic identification instrument and a second digital token associated with the second electronic identification instrument to the wallet application of the user device.
1 Assignment
0 Petitions
Accused Products
Abstract
The system may be configured to create and manage electronic credential information. The system may generate, by the computer based system and via a token engine, a first token. The system may associate, by the computer based system, the first token and the first electronic identification instrument. The system may further provision, by the computer based system and via a credential engine, a first electronic identification instrument and a first digital token associated with the first electronic identification instrument to a wallet application of a user device. The system may also provision, by the computer based system and via the credential engine, a second electronic identification instrument and a second digital token associated with the second electronic identification instrument to the wallet application of the user device.
28 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a computer based system and via an identity broker, first identity information from a first identity provider, wherein the first identity information includes a first electronic identification instrument; generating, by the computer based system and via a token engine, a first token; associating, by the computer based system, the first token and the first electronic identification instrument; provisioning, by the computer based system and via a credential engine, a first electronic identification instrument and a first digital token associated with the first electronic identification instrument to a wallet application of a user device; receiving, by the computer based system and via the identity broker, second identity information from a second identity provider; and provisioning, by the computer based system and via the credential engine, a second electronic identification instrument and a second digital token associated with the second electronic identification instrument to the wallet application of the user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
- 11. The method of claim 11, wherein the first token and the first electronic information are associated with government issued identification.
-
13. A computer based system, comprising:
-
a processor; a non-transitory memory configured to communicate with the processor, the non-transitory memory having instructions stored thereon; receiving, by the processor and via an identity broker, first identity information from a first identity provider, wherein the first identity information includes a first electronic identification instrument; generating, by the processor and via a token engine, a first token; associating, by the processor, the first token and the first electronic identification instrument; provisioning, by the processor and via a credential engine, a first electronic identification instrument and a first digital token associated with the first electronic identification instrument to a wallet application of a user device; receiving, by the processor and via the identity broker, second identity information from a second identity provider; and provisioning, by the processor and via the credential engine, a second electronic identification instrument and a second digital token associated with the second electronic identification instrument to the wallet application of the user device. - View Dependent Claims (14, 15, 16)
-
-
17. A non-transitory computer program product having computer-executable instructions stored thereon that, if executed by a computer based system, causes the computer based system to be capable of performing operations comprising:
-
receiving, by the computer based system and via an identity broker, first identity information from a first identity provider, wherein the first identity information includes a first electronic identification instrument; generating, by the computer based system and via a token engine, a first token; associating, by the computer based system, the first token and the first electronic identification instrument; provisioning, by the computer based system and via a credential engine, a first electronic identification instrument and a first digital token associated with the first electronic identification instrument to a wallet application of a user device; receiving, by the computer based system and via the identity broker, second identity information from a second identity provider; and provisioning, by the computer based system and via the credential engine, a second electronic identification instrument and a second digital token associated with the second electronic identification instrument to the wallet application of the user device. - View Dependent Claims (18, 19, 20)
-
Specification