SYSTEM AND METHOD FOR ESTABLISHING AND MONETIZING TRUSTED IDENTITIES IN CYBERSPACE WITH PERSONAL DATA SERVICE AND USER CONSOLE
First Claim
1. A method for verifying an attribute asserted on line:
- receiving at attribute exchange network (AXN) device a verification request from a computing device operated by a relying party (RP);
identifying by AXN device at least one attribute provider (AP) associated with the RP for purposes of attribute verification;
sending from the AXN device a verification request to a computing device operated by the at least one AP; and
sending from the AXN device a claim received by the at least one AP from a computing device operated by an end user one AP to the computing device operated by the RP via the AXN
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for establishing and monetizing trusted identities in cyberspace relying upon user opt in. Users request to attain secure IDs by accessing parties that will rely on secure IDs to complete a transaction, for example merchants and service providers (relying parties). The relying parties (RPs) communicate with identity service providers and attribute providers via an Attribute Exchange Network (AXN) in order to obtain verified attributes associated with an entity (end user or user) that wishes to conduct business with the relying party. The relying party makes requests for verified attributes that are important to consummating business transactions for the relying party. Users are informed of requests for attributes on behalf of relying parties and users have the option to verify attributes, and add new attributes that may be useful or required for conducting business with relying parties.
109 Citations
19 Claims
-
1. A method for verifying an attribute asserted on line:
-
receiving at attribute exchange network (AXN) device a verification request from a computing device operated by a relying party (RP); identifying by AXN device at least one attribute provider (AP) associated with the RP for purposes of attribute verification; sending from the AXN device a verification request to a computing device operated by the at least one AP; and sending from the AXN device a claim received by the at least one AP from a computing device operated by an end user one AP to the computing device operated by the RP via the AXN - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of providing access to end user-asserted attributes, the method comprising:
-
receiving by an at attribute acess network (AXN) device at least one end user-asserted attribute; associating by the AXN device at least one end user-asserted attribute with an end user credential; creating by the AXN device an encrypted token containing the user asserted attributes; sending by the AXN device the encrypted token to a user-selected network location, wherein the user-selected location is associated with a key retained by the AXN; and accessing by the AXN the encrypted token using the key in response to a request from a computing device operated by the user, wherein the request comprises the associated end user credential. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method providing access to end user-asserted attributes, the method comprising:
-
receiving by an attribute acess network (AXN) device a first credential asserted by an end-user to one or more relying parties (RPs); accessing by the AXN device a database; requesting by the AXN device a first location of a first encrypted token associated with the asserted first credential from the database; acquiring by the AXN device the first encrypted token associated with the asserted first credential from the first location; acquiring by the AXN device from the first encrypted token a first set of attributes of the end user, wherein the first set of attributes further identifies permissions grant by the end user to the one or more RPs to view attributes selected from the first set of attributes; and populating by the AXN device a web page with the first set of attributes and the permissions for each of the one or more RPs to view attributes selected from the first set of attributes. - View Dependent Claims (12, 13)
-
-
14. A method for managing access to attribute verification data, the method comprising:
-
receiving by an attribute exchange network (AXN) device a request from a computing device operated by an end user to open a browser session, wherein the request comprises a unique identifier associated with the end user via a first credential; and provisioning by the AXN device the user computing device to access a web page in response to the request. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification