×

System and methods for providing identity attribute validation in accordance with an attribute disclosure profile

  • US 8,863,308 B2
  • Filed: 12/01/2010
  • Issued: 10/14/2014
  • Est. Priority Date: 12/01/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method of server-based identity attribute validation, comprising:

  • a computer server receiving an identity attribute validation request from one of a plurality of communication devices, and an identifier associated with the one communication device, the identity attribute validation request requesting at least one attribute for disclosure to the one communication device, the computer server further receiving a credential and being configured with at least one attribute disclosure profile, each said attribute disclosure profile being associated with a respective one of the communication devices and identifying a disclosure authorization status for the associated communication device, for at least one attribute;

    the computer server determining a validity of the credential and the received identifier, and using the received identifier to locate the attribute disclosure profile associated with the one communication device; and

    the computer server providing the communication device with a response to the identity attribute validation request based on an outcome of the credential and identifier validity determination and a correlation between the at least one attribute of the identity attribute validation request and the at least one attribute of the located attribute disclosure profile, the attribute validation response including attribute data associated with the credential authorized for disclosure to the one communication device by the located attribute disclosure profile but excluding attribute data associated with the credential not authorized for disclosure to the one communication device by the located attribute disclosure profile,wherein the credential is associated with a hardware token, the computer server transmits a session token to the hardware token, and the credential validity determining step comprises the computer server verifying that the hardware token generated the credential from the session token, andwherein the hardware token is configured with a private encryption key, the computer server is configured with a public encryption key corresponding to the private encryption key, and the step of verifying the credential comprises the computer server validating the credential with the public encryption key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×