Identity management service using a blockchain providing identity transactions between devices
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06Q-020/40
H04L-009/30
H04L-009/32
H04L-009/14
H04L-009/06
H04W-012/06
H04W-012/04
G06K-019/06
G06F-021/31
G06Q-020/02
G06Q-020/32
G06Q-020/38
G06F-021/34
G06F-021/64
출원번호
US-0146872
(2016-05-04)
등록번호
US-10007913
(2018-06-26)
발명자
/ 주소
Ebrahimi, Armin
출원인 / 주소
ShoCard, Inc.
대리인 / 주소
Martine Penilla Group, LLP
인용정보
피인용 횟수 :
0인용 특허 :
15
초록▼
Logic on a first remote device causes the capture of personal data identifying a user from an identification card. The logic generates a hash value from the personal data using a hashing algorithm and signs the hash value with a digital signature created using a private key paired with a public key.
Logic on a first remote device causes the capture of personal data identifying a user from an identification card. The logic generates a hash value from the personal data using a hashing algorithm and signs the hash value with a digital signature created using a private key paired with a public key. The logic transmits, over a network, the signed hash value and the public key from the remote device to a distributed public database for storage. The logic receives, over the network, a transaction number from the distributed public database. The logic then transmits the transaction number and the personal data to a second remote device. Logic on the second remote device verifies that the hash value in the signed hash value is the same as a generated hash value and verifies that the signed hash value was signed with the private key.
대표청구항▼
1. A method for managing an identity of a user as executed by a first processor of a first smartphone and a second processor of a second smartphone, the method comprising operations of: receiving by the first processor personal data identifying the user from an identification card, wherein the perso
1. A method for managing an identity of a user as executed by a first processor of a first smartphone and a second processor of a second smartphone, the method comprising operations of: receiving by the first processor personal data identifying the user from an identification card, wherein the personal data is received on the first smartphone;creating by the first processor a hash value from the personal data using a hashing algorithm;signing by the first processor the hash value with a digital signature created using a first private key paired with a first public key;transmitting by the first processor, over a network, the signed hash value and the first public key from the first smartphone to a block chain database;receiving by the first processor a first transaction number from the block chain database; andtransmitting by the first processor the first transaction number and the personal data to the second processor of the second smartphone;using by the second processor the first transaction number to retrieve the signed hash value and the first public key from the block chain database;hashing by the second processor the personal data using the hashing algorithm to create a generated hash value;verifying by the second processor that the hash value in the signed hash value is the same as the generated hash value,verifying by the second processor that the signed hash value was signed with the first private key; andcreating by the second processor a certification to certify that the personal data was signed using the first private key and was stored to the block chain, the certification used for verifying the identity of the user. 2. The method of claim 1, wherein the certification includes the first transaction number and the personal data or selected fields of the personal data. 3. The method of claim 2, wherein the certification is signed with a second private key paired with a second public key on the second smartphone. 4. The method of claim 3, wherein the signed certification record is transmitted, over a network, to the block chain database. 5. The method of claim 4, wherein a second transaction number is received by the second smartphone from the block chain database. 6. The method of claim 1, wherein at least a part of the personal data is coded in a barcode or QR code. 7. A non-transitory computer-readable medium storing a computer program for managing an identity of a user as executed by a first processor of a first smartphone and a second processor of a second smartphone, the computer-readable medium comprising a first set of instructions that when executed causes the first processor to: receive personal data identifying the user from an identification card, wherein the personal data is received on the first smartphone;create a hash value from the personal data using a hashing algorithm;sign the hash value with a digital signature created using a first private key paired with a first public key;transmit, over a network, the signed hash value and the first public key from the first smartphone to a block chain database;receive a first transaction number from the block chain database; andtransmit the first transaction number and the personal data to the second processor of the second smartphone;wherein the computer-readable medium comprising a second set of instructions that when executed causes the second processor to; use the first transaction number to retrieve the signed hash value and the first public key from the block chain database;hash the personal data using the hashing algorithm to create a generated hash value;verify that the hash value in the signed hash value is the same as the generated hash value;verify that the signed hash value was signed with the first private key; andcreate a certification to certify that the personal data was signed using the first private key and was stored to the block chain, the certification used for verifying the identity of the user. 8. The computer-readable medium of claim 7, wherein the certification includes the first transaction number and the personal data or selected fields of the personal data. 9. The computer-readable medium of claim 8, wherein the certification is signed with a second private key paired with a second public key on the second smartphone. 10. The computer-readable medium of claim 9, wherein the signed certification record is transmitted, over a network, to the block chain database. 11. The computer-readable medium of claim 10, wherein a second transaction number is received by the second smartphone from the block chain database. 12. The computer-readable medium of claim 7, wherein at least a part of the personal data is coded in a barcode or QR code. 13. A method for managing an identity of a user as executed by a first processor of a first device and a second processor of a second device, the method comprising operations of: receiving by the first processor personal data identifying the user from an identification card, wherein the personal data is received on the first device;creating by the first processor a hash value from the personal data using a hashing algorithm;signing by the first processor the hash value with a digital signature created using a first private key paired with a first public key;transmitting by the first processor, over a network, the signed hash value and the first public key from the first device to a block chain database;receiving by the first processor a first transaction number from the block chain database; andtransmitting by the first processor the first transaction number and the personal data to the second processor of the second device;using by the second processor the first transaction number to retrieve the signed hash value and the first public key from the block chain database;hashing by the second processor the personal data using the hashing algorithm to create a generated hash value;verifying by the second processor that the hash value in the signed hash value is the same as the generated hash value;verifying by the second processor that the signed hash value was signed with the first private key; andcreating by the second processor a certification to certify that the personal data was signed using the first private key and was stored to the blockchain, the certification used for purposes of verifying the identity of the user. 14. The method of claim 13, wherein the certification includes the first transaction number and the personal data or selected fields of the personal data. 15. The method of claim 14, wherein the certification is signed with a second private key paired with a second public key on the second device. 16. The method of claim 15, wherein the signed certification record is transmitted, over a network, to the block chain database. 17. The method of claim 16, wherein a second transaction number is received by the second device from the block chain database. 18. The method of claim 13, wherein at least a part of the personal data is coded in a barcode or QR code. 19. A system for managing an identity of a user, comprising: a first device having a first processor configured to: receive personal data identifying the user from an identification card, wherein the personal data is received on the first device;create a hash value from the personal data using a hashing algorithm;sign the hash value with a digital signature created using a first private key paired with a first public key;transmit, over a network, the signed hash value and the first public key from the first device to a block chain database;receive a first transaction number from the block chain database; andtransmit the first transaction number and the personal data to a second device; andthe second device having a second processor configured to: use the first transaction number to retrieve the signed hash value and the first public key from the block chain database;hash the personal data using the hashing algorithm to create a generated hash value;verify that the hash value in the signed hash value is the same as the generated hash value;verify that the signed hash value was signed with the first private key; andcreate a certification to certify that the personal data was signed using the first private key and was stored to the block chain, the certification used for verifying the identity of the user. 20. The system of claim 19, wherein the certification includes the first transaction number and the personal data or selected fields of the personal data,wherein the certification is signed with a second private key paired with a second public key on the second device, andwherein the signed certification record is transmitted, over a network, to the block chain database. 21. The system of claim 19, wherein a second transaction number is received by the second device from the block chain database. 22. The system of claim 19, wherein the first device executes an application provided by an entity allowing for communication between the first device and the second device, andwherein the second device executes the application provided by the entity allowing for communication between the first device and the second device.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (15)
Dulude Robert S. ; Musgrave Clyde, Biometric certificates.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.