×

System and method for identity management

  • US 10,108,794 B2
  • Filed: 11/18/2016
  • Issued: 10/23/2018
  • Est. Priority Date: 08/23/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for utilizing a token set that computationally associates permissions and privileges with a digital foundation identity token, the method comprising:

  • transmitting, over a communications network and from a computing device of a requester to a computing device of a certification authority, a first request for computationally associating a first index of privileges and permissions with a digital foundation identity token, the first index specifically encoding the privileges and permissions of a first third-party subscriber to access transactional data of the requester, the request including the digital foundation identity token that identifies a person and has been issued to the requester by a trusted entity through a vetting process;

    in response to the certification authority determining that the digital foundation identity token is valid and verifying that the requester is the person identified by the digital foundation identity token, receiving, over the communications network and from the computing device of the certification authority, the digital foundation identity token detachably associated with the first index of privileges and permissions of the first third-party subscriber;

    based on the digital foundation identity token computationally associated with the first index of privileges and permissions of the first third-party subscriber, issuing a digital token to the first third-party subscriber such that transactional data of the requester becomes accessible to the first third-party subscriber in accordance with the first index of privileges and permissions, the requester being different from the first third-party subscriber;

    providing the issued digital token to a computing device of the first third-party subscriber in order to form a computational association between the issued digital token and a second digital foundation identity token that identifies a second person and has been issued to the first third-party subscriber by the trusted entity through a vetting process;

    the computational association allowing the first third-party subscriber to access the transactional data of the requester in accordance with the first index of privileges and permissions after the certification authority, using the second digital foundation identity token, authenticates the first third-party subscriber by determining that the second digital foundation identity token is valid and verifies that the third party subscriber is the second person identified by the second digital foundation identity token.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×