Systems and methods for controlling data access by use of a universal anonymous identifier
First Claim
1. A computer implemented method for controlling data access, comprising:
- receiving documentation identifying a user;
defining a confidence level of an identity of the user based on the documentation identifying the user;
generating, by a communication platform processor and using a hash algorithm stored in a hashing database, a set of identifiers, the set including a unique universal identifier (UXID) associated with the user and based at least in part on the confidence level;
assigning, to the unique universal identifier (UXID), a graded user verification level that corresponds to the confidence level of the identity of the user based on the documentation identifying the user;
creating a user account associated with the set of identifiers, the user account including the unique universal identifier (UXID) and at least one of user data and generated data;
receiving a request to associate the user account with a subscriber-entity;
generating, by the communication platform processor and responsive to the request to associate the user account with the subscriber-entity, a unique entity-associated universal identifier (EA-UXID) that identifies the subscriber-entity and is included within the set of identifiers;
receiving a request from the subscriber-entity to access the user account;
authorizing, by use of the communication platform processor, the request from the subscriber-entity based at least in part on an evaluation of the graded user verification level, and at least one of the unique entity-associated universal identifier (EA-UXID), and the unique universal identifier (UXID); and
providing, by use of the communication platform processor, at least one of the user data and the generated data from at least one of an individual data database and an entity data database to the subscriber-entity.
0 Assignments
0 Petitions
Accused Products
Abstract
A universal anonymous data collection and exchange service is provided where individuals and entities initially register with the service utilizing “legally authentic” identity documentation to obtain a “universal ID” (UXID). The UXID consists of a sting of alphanumeric digits selected from a hash function that is performed on a string of personally identifying information. Once registered, the individual and entity UXIDs are used as a means by the service to engage in a pre-defined confidential data collection and exchange protocol between participating, registered UXID holders. The service is designed for use across many applications, individuals and entities, and may support one-time or recurring collection of data.
-
Citations
23 Claims
-
1. A computer implemented method for controlling data access, comprising:
-
receiving documentation identifying a user; defining a confidence level of an identity of the user based on the documentation identifying the user; generating, by a communication platform processor and using a hash algorithm stored in a hashing database, a set of identifiers, the set including a unique universal identifier (UXID) associated with the user and based at least in part on the confidence level; assigning, to the unique universal identifier (UXID), a graded user verification level that corresponds to the confidence level of the identity of the user based on the documentation identifying the user; creating a user account associated with the set of identifiers, the user account including the unique universal identifier (UXID) and at least one of user data and generated data; receiving a request to associate the user account with a subscriber-entity; generating, by the communication platform processor and responsive to the request to associate the user account with the subscriber-entity, a unique entity-associated universal identifier (EA-UXID) that identifies the subscriber-entity and is included within the set of identifiers; receiving a request from the subscriber-entity to access the user account; authorizing, by use of the communication platform processor, the request from the subscriber-entity based at least in part on an evaluation of the graded user verification level, and at least one of the unique entity-associated universal identifier (EA-UXID), and the unique universal identifier (UXID); and providing, by use of the communication platform processor, at least one of the user data and the generated data from at least one of an individual data database and an entity data database to the subscriber-entity. - View Dependent Claims (2, 3, 4, 5)
-
-
6. In a computer network, a data access control system, comprising:
-
a universal identification communication platform including at least one processor and at least one database; the processor configured to receive documentation identifying a user and to define a confidence level of an identity of the user based on the documentation identifying the user; and the processor configured to generate a set of identifiers, the set including a unique universal identifier (UXID) associated with the user and based at least in part on the confidence level; the processor configured to assign a graded user verification level to the unique universal identifier (UXID) based on the documentation, wherein the graded user verification level corresponds to the confidence level of the identity of the user based on the documentation identifying the user; the processor configured to create a user account associated with the set of identifiers; the universal identification communication platform configured to receive a request to associate the user account with a subscriber-entity, and to generate a unique entity-associated universal identifier (EA-UXID) that identifies the subscriber-entity and is part of the set of identifiers; the database configured to store data associated with the user account, the data including user data and the graded user verification level; the processor configured to authorize a request from the subscriber-entity to access the user account based at least in part on the graded user verification level, and at least one of the unique entity-associated universal identifier (EA-UXID), and the unique universal identifier (UXID); and the universal identification communication platform configured to provide at least one of the user data and the data generated by the universal identification communication platform to the subscriber entity. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. An article of manufacture having stored thereon sequences of instructions including instructions that will cause a processor to:
-
receive documentation identifying a user; define a confidence level of an identity of the user based on the documentation identifying the user; generate a set of identifiers including a unique universal identifier (UXID) associated with the user and based at least in part on the confidence level; assign a graded user verification level that corresponds to the confidence level of the identity of the user based on the documentation identifying the user; create a user account associated with the set of identifiers, the user account including at least one of user data and generated data; receive a request to associate the user account with a subscriber-entity; generate, responsive to the request to associate the user account with the subscriber-entity, a unique entity-associated universal identifier (EA-UXID) that identifies the subscriber-entity and is included within the set of identifiers; receive from the subscriber-entity a request to access the user account; authorize the request from the subscriber-entity based at least in part on the graded user verification level, and at least one of the unique entity-associated universal identifier (EA-UXID), and the unique universal identifier (UXID); and provide at least one of the user data and the generated data to the subscriber-entity. - View Dependent Claims (22, 23)
-
Specification