Identity validation and verification system and associated methods
First Claim
1. A computer implemented method for personalizing a secure personal database using a hub device, the method comprising:
- electronically receiving a personal dataset including identifiable attributes of a user by a hardware processor;
electronically verifying authenticity of an asserted identity of the user including the identifiable attributes;
electronically verifying the personal dataset;
storing the personal dataset on the secure personal database;
validating the identifiable attributes of the user, wherein the validating includes confirming the asserted identity matches the identifiable attributes;
generating a digital security element as a result of the verifying and the validating of the identifiable attributes;
enabling the digital security element for granting electronic access to the personal dataset on the secure personal database by an authorized member of an authorized registry;
designating privacy levels of trust for access to the personal dataset by the user, wherein the levels of trust are limited by data use directives;
authorizing the access to the personal dataset by the user for the authorized member based on at least one level of trust; and
activating a hub device application by the authorized member for accessing the secure personal database through the identifiable attributes.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method verify and validate user identity for enrollment in a secure personal dataset accessing system, wherein a personal dataset includes identifiable attributes of a user. Authenticity of an asserted user identity includes electronically verified identifiable attributes to form the personal dataset. A biometric identifier is automatically captured for validating the identifiable attributes by confirming that the asserted identity matches identifiable attributes. A traceable e-audit trail is provided in an enterprise infrastructure and bench mark performance indicator. A generated digital security element results in the user electronically receiving a password and unique electronic address assigned to the user. The digital security element is then transmitted to the user and enables electronic access to the personal dataset, the personal dataset having been authenticated through the verification and validation. The user may use a smartphone, tablet, PC or laptop to generate their Emergency Medical and Contact DataSet.
-
Citations
1 Claim
-
1. A computer implemented method for personalizing a secure personal database using a hub device, the method comprising:
-
electronically receiving a personal dataset including identifiable attributes of a user by a hardware processor; electronically verifying authenticity of an asserted identity of the user including the identifiable attributes; electronically verifying the personal dataset; storing the personal dataset on the secure personal database; validating the identifiable attributes of the user, wherein the validating includes confirming the asserted identity matches the identifiable attributes; generating a digital security element as a result of the verifying and the validating of the identifiable attributes; enabling the digital security element for granting electronic access to the personal dataset on the secure personal database by an authorized member of an authorized registry; designating privacy levels of trust for access to the personal dataset by the user, wherein the levels of trust are limited by data use directives; authorizing the access to the personal dataset by the user for the authorized member based on at least one level of trust; and activating a hub device application by the authorized member for accessing the secure personal database through the identifiable attributes.
-
Specification