×

Method and system for interoperable identity and interoperable credentials

  • US 9,940,452 B2
  • Filed: 12/24/2014
  • Issued: 04/10/2018
  • Est. Priority Date: 08/28/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented on a computing device having at least one processor, storage, and a communication platform capable of making a connection to a network for authenticating a person, wherein the person is associated with an actual name of the person and the person is associated with a first credential verifiable by a first credential service agent, the first credential being associated with a first credential identifier, the method comprising the steps of:

  • receiving, by the computing device, an actual name of the person;

    determining the first credential identifier associated with the person based on the received actual name;

    verifying the first credential provided by the person via the first credential service agent using the determined first credential identifier of the person;

    soliciting, after successful verification of the first credential provided by the person, a peripheral name from the person;

    generating a universal name by combining a symbol, the actual name, and the peripheral name of the person;

    associating the universal name with the first credential identifier in a data store;

    receiving information related to a second credential associated with the person, the second credential being associated with a second credential identifier, the second credential being verifiable via a second credential service agent;

    associating the universal name with the second credential identifier in the data store;

    receiving a request for verifying the first credential, the request being for a trusted application and specifying the universal name and the first credential;

    determining, using the universal name, the first credential identifier associated with the universal name;

    providing, by the computing device, the first credential identifier and the first credential from the request to the first credential service agent; and

    providing, by the computing device, a response from the first credential service agent to the trusted application that completes the verification request, wherein the trusted application is associated with the second credential.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×