System and method for authenticating a person's identity using a trusted entity
DCFirst Claim
1. A method for authenticating a person'"'"'s identity to a transactional entity using a trusted entity with a secure repository of a person'"'"'s personal identity information, comprising:
- receiving personal identity information at a trusted entity computer system, the personal identity information being confidentially stored by the trusted entity computer system;
in the secure repository, storing a user identifier and a password that are associated with, but do not contain, the personal identity information;
at the trusted entity computer system, receiving a request from the person for a unique code, the request including the user identifier and the password, the person'"'"'s identity having been previously authenticated by the trusted entity computer system;
providing the unique code to the person, the unique code comprising a person identifier and a key, wherein the unique code is thereafter transmitted to a transactional entity to identify the person without providing the personal identity information to the transactional entity; and
the trusted entity computer system confirming the unique code to the transactional entity to verify the person'"'"'s identity.
5 Assignments
Litigations
1 Petition
Accused Products
Abstract
A system and method are provided for authenticating a person'"'"'s identity to a business using a trusted entity with a secure repository to store and protect the person'"'"'s identity information. The person accesses their account on the trusted entity'"'"'s server using a user name and a password. Then, the trusted entity grants the person a unique code so the person can authenticate their identity to the business. The person delivers the unique code to the transactional entity. The business makes a request to verify the unique code with the trusted entity. The trusted entity verifies the unique code, which authenticates the person'"'"'s identity to the business.
53 Citations
24 Claims
-
1. A method for authenticating a person'"'"'s identity to a transactional entity using a trusted entity with a secure repository of a person'"'"'s personal identity information, comprising:
-
receiving personal identity information at a trusted entity computer system, the personal identity information being confidentially stored by the trusted entity computer system; in the secure repository, storing a user identifier and a password that are associated with, but do not contain, the personal identity information; at the trusted entity computer system, receiving a request from the person for a unique code, the request including the user identifier and the password, the person'"'"'s identity having been previously authenticated by the trusted entity computer system; providing the unique code to the person, the unique code comprising a person identifier and a key, wherein the unique code is thereafter transmitted to a transactional entity to identify the person without providing the personal identity information to the transactional entity; and the trusted entity computer system confirming the unique code to the transactional entity to verify the person'"'"'s identity. - View Dependent Claims (4, 5, 6, 7, 8, 10, 13, 15, 17)
-
-
2. A method for authenticating a person'"'"'s identity to a transactional entity using a trusted entity with a secure repository of a person'"'"'s personal identity information, comprising:
-
receiving personal identity information at a trusted entity computer system, the personal identity information being confidentially stored by the trusted entity computer system; in the secure repository, storing a user identifier and a password that are associated with, but do not contain, the personal identity information; at the trusted entity computer system, receiving a request from the person for a single-use key, the request including the user identifier and the password, wherein the single-use key is associated with a person identifier to form a unique code, the person'"'"'s identity having been previously authenticated by the trusted entity computer system; providing the unique code to the person, wherein the unique code is thereafter transmitted to a transactional entity to identify the person without providing the personal identity information to the transactional entity; and the trusted entity computer system confirming the unique code to the transactional entity to verify the person'"'"'s identity; and displaying a photograph of the person stored with the person'"'"'s personal identity information in the trusted entity'"'"'s secure repository to the transactional entity after the person'"'"'s identity has been verified using the unique code. - View Dependent Claims (3, 9, 11, 12, 14, 16, 18, 19)
-
-
20. A method for generating a single-use key used for authenticating a person'"'"'s identity using a trusted entity with a secure repository of a person'"'"'s personal identity information comprising:
-
receiving personal identity information at a trusted entity computer system, the personal identity information being confidentially stored by the trusted entity computer system; storing a user identifier and a password that are associated with, but do not contain, the personal identity information; receiving the person'"'"'s responses to inquiries, the inquiries having been selected by a verifying entity to authenticate the person'"'"'s identity; accessing an account of the person on the trusted entity computer system using the user identifier and the password; comparing the person'"'"'s responses to the inquiries with the person'"'"'s stored personal identity information; and generating a single-use key associated with a person identifier to form a unique code to allow a transaction to be executed, if the person'"'"'s responses match the person'"'"'s stored personal identity information stored, the person'"'"'s identity having been previously authenticated by the trusted entity computer system. - View Dependent Claims (21, 22, 23)
-
-
24. A system for authenticating a person'"'"'s identity to a transactional entity using a trusted entity, comprising:
-
a trusted entity which receives personal identity information from a person, the personal identity information being confidentially stored by the trusted entity; a user identifier associated with but not containing any of the personal identity information; a password associated with but not containing any of the personal identity information; a client module with a person input device for a person to enter the user identifier and the password, a person processing unit connected to the person input device to prompt the person for the user identifier and the password, and a person display unit connected to the person processing unit to display a the key associated with a person identifier to form a unique code to the person, the person'"'"'s identity having been previously authenticated by the trusted entity; a transactional processing module with an transactional input device for the transactional entity to enter the key, a transactional processing unit connected to the transactional input device to prompt the transactional entity for the key, and a transactional display unit connected to the transactional processing unit to display a message to the transactional entity authenticating the person'"'"'s identity and to display a photograph of the person, whereby the photograph is a secondary verification to the unique code; and a trusted entity server with a trusted entity processing unit to process requests from the client module and the transactional processing module using a network, and a database accessible to the trusted entity processing unit to store the user identifier, the password, the unique code, and the person'"'"'s personal identity information, including the photograph.
-
Specification