System and method for identity management
First Claim
1. A computer-implemented method for utilizing a token set that computationally associates permissions and privileges with a digital foundation identity token, the method comprising:
- transmitting, over a communications network and from a computing device of a requester to a computing device of a certification authority, a first request for computationally associating a first index of privileges and permissions with a digital foundation identity token, the first index specifically encoding the privileges and permissions of a first third-party subscriber to access transactional data of the requester, the request including the digital foundation identity token that identifies a person and has been issued to the requester by a trusted entity through a vetting process;
in response to the certification authority determining that the digital foundation identity token is valid and verifying that the requester is the person identified by the digital foundation identity token, receiving, over the communications network and from the computing device of the certification authority, the digital foundation identity token detachably associated with the first index of privileges and permissions of the first third-party subscriber;
based on the digital foundation identity token computationally associated with the first index of privileges and permissions of the first third-party subscriber, issuing a digital token to the first third-party subscriber such that transactional data of the requester becomes accessible to the first third-party subscriber in accordance with the first index of privileges and permissions, the requester being different from the first third-party subscriber;
providing the issued digital token to a computing device of the first third-party subscriber in order to form a computational association between the issued digital token and a second digital foundation identity token that identifies a second person and has been issued to the first third-party subscriber by the trusted entity through a vetting process;
the computational association allowing the first third-party subscriber to access the transactional data of the requester in accordance with the first index of privileges and permissions after the certification authority, using the second digital foundation identity token, authenticates the first third-party subscriber by determining that the second digital foundation identity token is valid and verifies that the third party subscriber is the second person identified by the second digital foundation identity token.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method includes: receiving a request for associating a first index of privileges and permissions with an identity token, the first index specifically encoding the privileges and permissions of a first subscriber in accessing transactional data of the requester, the request including the identity token that identifies a person and has been issued to the requester by a trusted entity through a vetting process; in response to determining that the identity token is valid and verifying that the requester is the person identified by the identity token, associating the first index of privileges and permissions of the first subscriber with the identity token; and providing the identity token associated with the first index of privileges and permissions of the first subscriber, the identity token enabling the first subscriber to access transactional data of the requester in accordance with the first index of privileges and permissions.
40 Citations
12 Claims
-
1. A computer-implemented method for utilizing a token set that computationally associates permissions and privileges with a digital foundation identity token, the method comprising:
-
transmitting, over a communications network and from a computing device of a requester to a computing device of a certification authority, a first request for computationally associating a first index of privileges and permissions with a digital foundation identity token, the first index specifically encoding the privileges and permissions of a first third-party subscriber to access transactional data of the requester, the request including the digital foundation identity token that identifies a person and has been issued to the requester by a trusted entity through a vetting process; in response to the certification authority determining that the digital foundation identity token is valid and verifying that the requester is the person identified by the digital foundation identity token, receiving, over the communications network and from the computing device of the certification authority, the digital foundation identity token detachably associated with the first index of privileges and permissions of the first third-party subscriber; based on the digital foundation identity token computationally associated with the first index of privileges and permissions of the first third-party subscriber, issuing a digital token to the first third-party subscriber such that transactional data of the requester becomes accessible to the first third-party subscriber in accordance with the first index of privileges and permissions, the requester being different from the first third-party subscriber; providing the issued digital token to a computing device of the first third-party subscriber in order to form a computational association between the issued digital token and a second digital foundation identity token that identifies a second person and has been issued to the first third-party subscriber by the trusted entity through a vetting process;
the computational association allowing the first third-party subscriber to access the transactional data of the requester in accordance with the first index of privileges and permissions after the certification authority, using the second digital foundation identity token, authenticates the first third-party subscriber by determining that the second digital foundation identity token is valid and verifies that the third party subscriber is the second person identified by the second digital foundation identity token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method for utilizing a token set that computationally associates permissions and privileges with a digital foundation identity token, the method comprising:
-
transmitting, over a communications network and from a computing device of a requester to a computing device of a certification authority, a first request for computationally associating a first index of privileges and permissions with a digital foundation identity token of the requester, the first index specifically encoding the privileges and permissions of a first third-party subscriber to access transactional data of the requester, the request including the digital foundation identity token that identifies a person and has been issued to the requester by a trusted entity through a vetting process, the first request encapsulating the digital foundation identity token; in response to the certification authority determining that the digital foundation identity token is valid and verifying that the requester is the person identified by the digital foundation identity token, receiving, over the communications network and from the computing device of the certification authority, the digital foundation identity token detachably associated with the first index of privileges and permissions of the first third-party subscriber; based on the digital foundation identity token computationally associated with the first index of privileges and permissions of the first third-party subscriber, issuing a digital token to the first third-party subscriber such that transactional data of the requester becomes accessible to the first third-party subscriber in accordance with the first index of privileges and permissions, the requester being different from the first third-party subscriber; providing the issued digital token to the computing device of the certification authority in order to form a computational association between the issued digital token and a second digital foundation identity token that identifies a second person and has been issued to the first third-party subscriber by the trusted entity through a vetting process;
the computational association allowing the first third-party subscriber to access the transactional data of the requester in accordance with the first index of privileges and permissions after the certification authority, using the second digital foundation identity token, authenticates the first third-party subscriber by determining that the second digital foundation identity token is valid and verifies that third party subscriber is the second person identified by the second digital foundation identity token.
-
Specification