Privacy-preserving identity verification
Abstract:
Aspects of the technology implement a authenticating protocol that enables a Trusted Provider to vouch for a requesting entity when that entity seeks verification from an authenticating entity (FIG. 1). This is done without sharing the requesting entity's confidential or other personal information directly with the authenticating entity (FIG. 1). Instead, the Trusted Provider is able to use specific information about a requesting entity, such as contact information that forms an identity record (404), and generate a hash of the record (408). The hash is sent to an authenticating entity (410), which returns a secure token to the Trusted Provider (508). The secure token and identity record information are used to create a verification URL (414), which is shared with the requesting entity (416). The verification URL, when clicked, links back to the authenticating entity (FIG. 1), which validates the requesting entity (512, 514). This allows for instant identification of the requesting entity without the parties having to perform advanced cryptographic operations (516).
Public/Granted literature
Information query
Patent Agency Ranking
0/0