Systems and methods for managing the identity of a user, for managing the identity of the user in a public storage facility, and for certifying pending transactions for a user are disclosed. One example method includes receiving, at an input device, personal data that identifies the user. The person
Systems and methods for managing the identity of a user, for managing the identity of the user in a public storage facility, and for certifying pending transactions for a user are disclosed. One example method includes receiving, at an input device, personal data that identifies the user. The personal data is represented as input data. The input device is configured to process a hashing function to provide a hash value and user accessible interface for transmitting the hash value and a public key of the user to the public storage facility, e.g., block chain, and for receiving back from the public storage facility a transaction number corresponding to the hash value and the public key. In one example, the input device is configured to encrypt the hash value, a time stamp and the transaction number with a public key of a certification entity to provide user certifiable data to the certification entity. The certification entity is configured to access the public storage facility to verify the user. Also provided are systems and methods for certifying pending financial transactions, pending debit and/or credit card transactions, and other pending transactions are also disclosed. Systems and methods signing and certifying documents are also disclosed.
대표청구항▼
1. A system for verifying identity of a user, the system comprising: an input device for receiving the personal data identifying the user from an identification card to define input data; the input device executing an encrypting machine that encrypts the input data using a public key of the user, th
1. A system for verifying identity of a user, the system comprising: an input device for receiving the personal data identifying the user from an identification card to define input data; the input device executing an encrypting machine that encrypts the input data using a public key of the user, the public key of the user being paired with a private key of the user;the input device executing a hashing machine for hashing the encrypted input data to provide a hash value;the input device executing a user accessible interface for transmitting the hash value and the public key to a public storage facility and for receiving back from the public storage facility a transaction number corresponding to the hash value and the public key, for said verifying the identity of the user without decrypting the encrypted input data, wherein a receiver of the transmitted input data uses the transaction number and the public key of the user, to perform an encryption of the input data, determining whether the identity is verified. 2. The system of claim 1, wherein the input device is configured to execute an RSA encryption module. 3. The system of claim 1, wherein the identification card is one of a driver license, or a passport, or an employee badge, or a military identification, or a political identification. 4. The system of claim 1, wherein the input device receives the personal data using one of a digital camera, or a scanner, or a smartphone, or a keyboard, or a touchscreen, or voice recognition, or handwriting recognition, or a combination of two or more thereof. 5. The system of claim 1, wherein at least a part of the personal data is coded in a barcode or QR code. 6. The system of claim 1, wherein the input device communicates over a communication link with the public storage facility, the public storage facility being a block chain system that is configured to generate the transaction number. 7. The system of claim 1, wherein the input device is configured to share the transaction number to a certifying machine to enable the certifying machine to perform verification of the identity of the user. 8. The system of claim 7, wherein the certifying machine is configured to transact with the public storage facility to complete at least one operation to process the verification of the identity of the user. 9. The system of claim 1, wherein the input device is configured to receive certification of identify of the user from one or more certifying entities, each certifying entity is configured to perform at least one verification operation against data stored to the public storage facility. 10. The system of claim 1, wherein the input device is one of a smartphone, or a tablet, or an electronic device. 11. The system of claim 1, wherein the public key and the private key are generated using an RSA encryption algorithm or an Elliptic Curve Digital Signature Algorithm (ECDSA). 12. The system of claim 1, wherein the user accessible interface is controllable by the user to provide the transaction number, public key and hash value to a third party. 13. The system of claim 1, wherein the public storage facility is adapted to communicate over the Internet, and the public storage facility comprises a block chain of a bitcoin online payment system. 14. A system for certifying an identity of a user, comprising: an identification card containing a personal data identifying the user; an input device for inputting the personal data from the identification card to provide input data;the input device processing an encryption machine to encrypt the input data with a public key of the user to provide encrypted data, wherein a private key of the user is paired with the public key;the input device processing a hashing machine for hashing the encrypted data to provide a hash value;the input device processing a user accessible interface for transmitting the hash value and the public key to the public storage facility and for receiving back from the public storage facility a transaction number corresponding to the hash value and the public key; wherein a receiver of the transmitted input data uses the transaction number and the public key of the user, to perform an encryption of the input data, determining whether the identity is verified without decrypting the encrypted input data;wherein the encryption machine is adapted to encrypt the hash value, a time stamp and the transaction number with a public key of a certification entity to provide user certifiable data to the certification entity, the certification entity is adapted to:decrypt the user certifiable data with a private key of the certification entity to recover the hash value, the time stamp and the transaction number;retrieve the hash value from the public storage facility corresponding to the transaction number;compare the recovered hash value to the retrieved hash value; andcertify the identity of the user as a function of the recovered hash value being the same as the retrieved hash value. 15. The system of claim 14, wherein the certification entity is further adapted to: encrypt the transaction number and the second transaction number with the public key of the certification entity to provide an encrypted certification record; andtransmit the encrypted certification record to the public storage facility and receive back from the public storage facility a certification transaction number corresponding to the encrypted certification record. 16. The system of claim 14, wherein the input device is configured to execute an RSA encryption module. 17. The system of claim 14, wherein the identification card is one of a driver license, or a passport, or an employee badge, or a military identification, or a political identification, and wherein the input device receives the personal data using one of a digital camera, or a scanner, or a smartphone, or a keyboard, or a touchscreen, or voice recognition, or handwriting recognition, or a combination of two or more thereof. 18. The system of claim 14, wherein the input device communicates over a communication link with the public storage facility, the public storage facility being a block chain system that is configured to generate the transaction number, and the input device is configured to share the transaction number to the certification entity to enable the verification of the identity of the user via the block chain.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (10)
Dulude Robert S. ; Musgrave Clyde, Biometric certificates.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.