A METHOD FOR MANAGING A VERIFIED DIGITAL IDENTITY
20210019763 ยท 2021-01-21
Inventors
Cpc classification
H04L9/3239
ELECTRICITY
G06F16/2379
PHYSICS
G06Q20/38215
PHYSICS
H04L2209/56
ELECTRICITY
G06Q20/02
PHYSICS
International classification
Abstract
A method and a system for managing a verified digital identity of a user is disclosed. The method comprises receiving a verified digital identity for a user, the digital identity comprising user-data stored as data items; wherein each data item is certified as a verified data item. The method includes the following transactions: receiving a user-data consent from the user to enable one or more institutions, including a first institution, access to a selected group of the data items; receiving a user-data request from the first institution requesting access to user data from the digital identity, determining whether the first institution's request matches the user-data consent for enabling access to the selected group of data items, in accordance with a determination that the institution's user-data request matches the user-data consent for enabling access to the data items, granting the user data request, and providing access for the first institution to the selected group of data items.
Claims
1. A method for managing a verified digital identity of a user, the method comprising; receiving a verified digital identity for a user, the digital identity comprising user-data stored as data items; wherein each data item is certified as a verified data item, the method including the following transactions: receiving a user-data consent from the user to enable one or more institutions, including a first institution, access to a selected group of the data items; receiving a user-data request from the first institution requesting access to user data from the digital identity, determining whether the first institution's request matches the user-data consent for enabling access to the selected group of data items, in accordance with a determination that the institution's user-data request matches the user-data consent for enabling access to the data items, granting the user data request, and providing access for the first institution to the selected group of data items.
2. A method according to claim 1, wherein transactions include user-data consent, user-data request, determination on requests, grant of user-data request and access provided for each of the one or more institutions, including the first institution.
3. A method according to claim 1 or 2, further comprising maintaining a record of each transaction, each transaction being of a transaction type selected from the group of the following transaction types: user-data consent, grant of access, revocation of consents, deletion of consents, requests for deletion, request for user-data, request for verification of data, request for access, deletion, response of verification of data, re-sharing of data.
4. A method according to claim 3, wherein the selected group of data items are determined based on the transaction type and wherein a hash value is determined for the selected group of data items; the method further comprises storing the hash value of the selected group of data items with the transaction record.
5. A method according to any of claims 3-4, wherein the transaction record is written to a provenance enabling system.
6. A method according to claim 5, wherein the provenance enabling system is a blockchain, such as a private blockchain replicated and/or distributed among trusted partners.
7. A method according to any of the preceding claims, wherein the method comprises receiving from the user a request for revocation of at least a part of the user-data consent, and revoking access to a corresponding part of data items.
8. A method according to any of the preceding claims, wherein the user-data consent is institution and data item specific, and wherein the selected group of data items is selected for each of the one or more institutions or for each group of the one or more institutions.
9. A method according to any of the preceding claims, wherein the user-data consent is a time limited consent, and wherein grant of access is automatically revoked upon expiry of the time limited consent.
10. A method according to any of the preceding claims, further comprising receiving a request from the user to withdraw a user-data consent; and in response to receiving the request withdraw the consent either immediately or upon approval of the request to withdraw the user-data consent.
11. A method according to any of the preceding claims, wherein the verified digital identity is a verified digital legal identity.
12. A method according to any of the preceding claims, wherein the verified digital identity comprises data item legal confirmations and/or data item legal proofs, the data item legal confirmations and/or the data item legal proofs including certification that required data item verification processes have been performed.
13. A method according to any of the preceding claims, wherein managing a verified digital identity of a user further comprises receiving from the user additional user data, the additional user data being stored as new verified data items, the additional user data being stored as updated verified data items replacing previous verified data items, the additional user data being corrected user data replacing previous data items stored but not certified as verified data items.
14. A method according to claim 13, wherein in response to receiving additional user data, processing the additional user data for verification, and in accordance with a determination that the additional user data can be certified as verified user data, storing the verified user data as verified data items.
15. A method according to claim 14, wherein processing the additional user data for verification comprises sending a request for verification of the additional user data and obtaining verification of the user data.
16. A method according to claim 15, wherein the request for verification of the additional user data and the verification of user data is obtained from a third party verification service company.
17. A method according to any of the preceding claims, wherein the one or more institutions provides access to a web interface for the user, and wherein the web interface enables the user to manage the verified digital identity of the user including providing consent to user-data and uploading of user data, including additional user data.
18. A method according to claim 17, wherein the web interface is a web interface of the one or more institutions, or wherein the web interface is a web interface module for integration with a web interface of the one or more institutions.
19. A method according to any of the preceding claims, wherein the verified digital identity is used in a cryptocurrency transaction and wherein the verified digital identity or selected data items of the verified digital identity is used as proof of identity for the cryptocurrency transaction, and wherein only the hash value of the verified digital identity or of the selected data items of the verified digital identity is recorded with the transaction.
20. A method according to any of the preceding claims, wherein managing a verified digital identity of a user further comprises receiving from the user a request for deletion or amendment of a data item, and wherein in accordance with a determination that the data item does not form part of a selected group of data items for which grant of access has been provided, fulfil the request, and in accordance with a determination that the data item forms part of a selected group of data items for which grant of access has been provided, deny the request.
21. A method according to any of the preceding claims, wherein the method comprises upon receiving a user-data consent from the user and providing access for the first institution to the selected group of data, enabling the first institution to re-share at least a part of the selected group of data to further institutions.
22. A method for onboarding users, wherein the method comprises managing a verified digital identity of a user by the method according to any of claims 1 to 20.
23. A system for managing a verified digital identity of a user, the system comprising: a client terminal; processor; a computer readable storage medium storing: a verified digital identity for a user, the digital identity comprising user-data stored as data items; wherein each data item is certified as a verified data item, user-data consents; and a computer program product comprising instructions which when executed by the processor: receiving a user-data consent from the user to enable one or more institutions, including a first institution, access to a selected group of the data items; receiving a user-data request from the first institution requesting access to user data from the digital identity, determining whether the first institution's request matches the user-data consent for enabling access to the selected group of data items, in accordance with a determination that the institution's user-data request matches the user-data consent for enabling access to the data items, granting the user data request, and providing access for the first institution to the selected group of data items.
24. A method according to claim 23, wherein a record of each transaction is stored in the computer readable storage medium, each transaction being of a transaction type selected from the group of the following transaction types: user-data consent, grant of access, revocation of consents, deletion of consents, requests for deletion, request for user-data, request for verification of data, request for access, deletion, response of verification of data, re-sharing of data.
25. A method according to claim 24, wherein the selected group of data items are determined based on the transaction type and wherein a hash value is determined for the selected group of data items and stored with the selected group of data items with the transaction record.
26. The system according to claim 25, wherein the computer program product comprises instructions receiving from the user a request for revocation of at least a part of the user-data consent, and revoking access to a corresponding part of data items.
27. The system according to claim 25 or 26, wherein the computer program product comprises instructions for processing additional user data for verification, the instructions comprises sending a request for verification of the additional user data, obtaining verification of the user data, and storing the obtained verification of user data on the computer readable medium.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0097] The above and other features and advantages will become readily apparent to those skilled in the art by the following detailed description of exemplary embodiments thereof with reference to the attached drawings, in which:
[0098]
[0099]
[0100]
[0101]
[0102]
[0103]
DETAILED DESCRIPTION
[0104] Various embodiments are described hereinafter with reference to the figures. Like reference numerals refer to like elements throughout. Like elements will, thus, not be described in detail with respect to the description of each figure. It should also be noted that the figures are only intended to facilitate the description of the embodiments. They are not intended as an exhaustive description of the claimed invention or as a limitation on the scope of the claimed invention. In addition, an illustrated embodiment needs not have all the aspects or advantages shown. An aspect or an advantage described in conjunction with a particular embodiment is not necessarily limited to that embodiment and can be practiced in any other embodiments even if not so illustrated, or if not so explicitly described.
[0105] Reference will now be made in detail to some specific examples of the invention including the best modes contemplated by the inventors for carrying out the invention. Examples of these specific embodiments are illustrated in the accompanying drawings. While the invention is described in conjunction with these specific embodiments, it will be understood that it is not intended to limit the invention to the described embodiments. On the contrary, it is intended to cover alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims.
EXAMPLES
[0106] In some embodiments, a method for managing or handling user-data is disclosed, the method may comprise; [0107] receiving user-data; [0108] creating a digital identity for the user, the digital identity comprising the received user-data as data items; [0109] storing the digital identity on a databasereceiving a user-data permission consent from the user to enable an institution access to one or more of the data items of the digital identity, and updating a consent status for the user-data permission; [0110] receiving a user-data request from the institution to access the one or more user-data items, [0111] comparing the user-data request to the consent status, and [0112] if the user-data request and the consent status match then the user-data request is granted.
[0113] In some embodiments, a system managing or handling user data is disclosed. The system may comprise: [0114] a client terminal; [0115] hardware processor; [0116] a computer readable storage medium configured to:
[0117] storing received user data as data items,
[0118] storing user data permissions;
[0119] storing a computer program product comprising instructions which when executed by the hardware processor provides a digital tool for:
[0120] receiving customer request for access to individual user data items,
[0121] comparing the customer data request to the user data permissions,
[0122] enabling access to one or more user data items corresponding to a received customer data request where user permission is granted, and
[0123] creating a record of each data transaction.
[0124] In some embodiments, the received customer data may be stored on a computer readable storage medium and logged by a provenance enabled system.
[0125] The customer data may be verified and the verification certificates or logs are stored. The verification process can take many forms and should not be limited to the following examples. A passport verification may be verified by a dedicated third party such as Gemalto and an email may be verified by sending a verification link to the inputted email address. The verification step and result are stored on a computer readable storage medium and may be recorded to a provenance enabling system such as blockchain. The record may in turn be a hash of the data stored or any number of hashes.
[0126] Each data verification is stored on a computer readable storage medium and may be recorded on a provenance enabling system. Alternatively all data verifications can be completed and the final combined verification process may be recorded to a provenance enabled system. The method and system provides the institution with irrefutably verified data items that have been requested and where the user permissions allow access.
[0127] The stored customer data may be viewed by the customer at any time via the user's unique user account and via a user interface.
[0128] The possibility to assign a permission consent to each item of data is presented to the customer. The customer may assign one or any number of institutions permissions to allow access to the customer information. The assigned permission consents are logged and recorded to a provenance enabling system and stored on a computer readable storage medium.
[0129] The institution may contact the customer and outline the user permission consents to be assigned to enable a digital legal identity to be created. The requirements for a digital legal identity may be different depending on the service or function required. For example the requirements for opening a bank account might require user permission consents for 10 pieces of customer data whereas the requirements for taking out travel insurance might only require user permission consents for 5 pieces of customer data.
[0130] The API receives a request from an institution to gain access to one or more of unique pieces of data or information for a unique and individual customer. This request is stored on a computer readable storage medium and logged and recorded to a provenance enabling system.
[0131] The request for user data items A, B and C is compared against the user permission consent status for user data items A, B and C for the specific institution requesting. Only the data which the institution requested and which the user has also given a permission consent for will be supplied to the institution. This data transaction is stored on a computer readable storage medium and logged and recorded to a provenance enabling system.
[0132] The API may also receive a revocation request from the user for one or more of the data permission consents for one or more institutions. In this example the consented data permissions for the one or more pieces of user data are rescinded and if there are no contractual obligations between the customer and the institution then no future access to the selected data by the selected institution can be achieved until the user consents the necessary permissions again. If there is a contractual obligation between the customer and the institution then the consent is valid for the period of the remaining contract timescale and rescinded when the contract expires or is terminated. The status of data and/or information consent revocation will be pending until the contract expires or is legally terminated. For example if a customer is still a customer with a financial institution then the consents are consented even if the customer revokes the consented permission. It is a legal requirement that the institution has access to the legal identity information of their customers and this will be stated in the contract between the customer and the financial institution. The customer must terminate the contract with the financial institution and remove their custom. Then all pending revoked permissions will be actioned and the financial institution will not have the required consent to the permissions for the data.
[0133] In addition the institution is notified of the user data rescinded to enable them to take the necessary actions with their internal systems. This data rescindment is stored on a computer readable storage medium and logged and recorded to a provenance enabling system.
[0134] In some embodiments the provenance enabling system is distributed amongst participating institutions. Due to the encrypted nature of the information on the provenance enabling system only an institution granted data permissions has access to the corresponding piece of data.
[0135] In some embodiments the institution may gain access to consented user data via a widget.
[0136] The method and system provides a single source of truth and irrefutable log of data permissions and transactions. The provenance enabling system provides an irrefutable log of all data transactions, requests and permissions and a single point of reference for any regulatory body wishing to audit transactions linked to one or more individual users or one or more individual institutions. This ensures full transparency and saves a substantial amount of time, money and man hours normally required to compile the relevant information to be submitted for audit.
[0137] In some embodiments the customer may request a data permission consent for an institution not linked or subscribed to the system. The system will generate a means for electronic access to the requested data and a security means. This could be with an encrypted file or a locked link that the customer can share with the institution. The system will also generate a means for unlocking the data and this is sent to the customer who can then share this with the institution. The customer is able to set a time limit on the length of time that the institution has access to the shared data.
[0138] In some embodiments of the invention an institution receives a request from a prospect that the prospect would like to become a user or customer. The institution requires that the prospect fulfils a set of predefined requirements to create a legal identity.
[0139] The institution notifies the prospect of the information or data required. The institution then sends a request to the API for access to the same information as the prospect was notified of. The institution receives any information that has been requested and also has a data specific user consented permission for the requesting institution.
[0140] The institution can see the status of the information verification and has a possibility to use their internal verification process if required or accept the verification stored on the system computer readable storage medium and logged and recorded to the provenance enabling system.
[0141] A change in regulations or legal requirements for the identification of customers would prompt the institution to send a notification to the customer to update the information or to grant a new permission for the information or data required. The institution would then submit a data request to the API which would be cross referenced against the customer chosen data permissions. The data would only be released to the institution if the institution data request matches the customer chosen consented data permission.
[0142] The permission consent can expire automatically after a predetermined period of time. A prospect may have given permission consents to an institution but then not become a customer for one reason or another. The consents could then auto expire after a predetermined period, for example after 90 days. The same functionality could be implemented for customers where the predetermined time limit may be set to a different value. Any value that complies with AML and data protection regulations.
[0143] The institution has a single point of contact for all of the user data and information and access to a log of the customer data transaction history. This ensures that the data history of a customer is independent of an individual employee or geographical location. The institution can ensure a single standard of verification across teams and geographical locations. The institution will be required by current and future legislation to ensure and provide proof that a customer's data has been deleted. The logs on the provenance enabling system ensure that all customer data transactions have been registered, mapped and accounted for. The institution may prefer that the customer data is stored within the present system by the independent third party providing the system, such as the system for managing a verified digital identity for a user. Any revocation of customer permissions can then be instantaneous and fully compliant.
[0144] In some embodiments of the invention the institution is not linked to the customer data permission system. In this embodiment the institution will request customer data and information items from the customer. The institution will receive an electronic means for accessing the requested customer information. The electronic means can be an encrypted file or a link to the customer data consent system. The institution will also receive a key to enable secure access to the requested data.
[0145]
[0146] In another example of current market practice a customer's information 1050 might be shared internally between departments and affiliated companies 1021, 1022, 1031 without the knowledge or consent of the customer 1010. The customer 1010 might not want to have information 1050 like e.g. current salary 1051 or tax reports 1052 shared with departments that could use the information to target products or adverts at the customer.
[0147]
[0148] The data items are verified by verification process 2060 in various ways. The verification process may generate a verification certificate, and the verification certificates are stored, e.g. on the computer readable storage medium 2070, as well as logged and recorded to a provenance enabled system 2050. The verification process 2060 can take many forms and may depend on the data type, legal requirements or institution preference and should not be limited to the following examples. A passport verification 2061 may be verified by a dedicated third party system such as Gemalto and an email 2062 may be verified by sending a verification link to the inputted email address. The verification step and result is recorded and written to a provenance enabling system 2050 such as blockchain. The record may in turn be a hash of the data stored or any number of hashes.
[0149] Each data verification 2060 is stored on a computer readable storage medium 2070 and recorded on a provenance enabling system 2050. Alternatively all data verifications can be completed and the final combined verification process may be recorded to a provenance enabled system 2050. The method and system provides the individual institutions 2020 with irrefutably verified data items that have been requested and where the user permission consents allow access.
[0150] The customer 2010 can view the data stored at any time via the user interface 2030. Typically, the costumer 2010 will have access to a user account, such as a unique user account, via the user interface 2030. The customer 2010 can chose which institutions 2020 have access to which items of data from their unique user account. The same data can be supplied to multiple institutions 2021, 2022 depending on the user permission consents present for the data items and the data requested by the institution. The method and system provides the customer 2010 with a single point of access and control of personal data access for multiple institutions 2021,2022. The single point of access and control may be through the user account.
[0151] The institution will not receive or have access to any customer or user information that it has not requested and which also has not been approved or given a permission for by the customer or user.
[0152] The reverse also applies and the user may choose to revoke the permission for individual data items for individual institutions. The method and system provides the customer with a simple and auditable method to revoke institution access to data items, such as to individual data items.
[0153] The institution may send a request for pieces of information, such as specific data items, and will be granted access to only those where the user has given that institution consent.
[0154] Each data request, verification and transaction is recorded to provenance enabling system.
[0155] In some embodiments the provenance enabling system is replicated and/or distributed 2051 amongst all or some of the participating institutions 2021. Due to the encrypted nature of the information on the provenance enabling system only a specific institution granted a data permission has access to the respective piece of data. The institution can gain access to user consented permission data via a widget or via an API.
[0156] The method and system provides a single source of truth and irrefutable log of data consents and transactions. The method and system provides the customer with a single point of control, contact and access for multiple interfaces with multiple institutions. The method and system provides the customer with an overview of permissions granted and permissions revoked. The method and system enables the customer to only have to provide data and information once. The method and system enables the customer to use the verified data for multiple institutions on multiple times.
[0157]
[0158] Each and every data request and transmission is recorded and logged on a provenance enabling system as well as stored to a database.
[0159]
[0160]
[0161] For existing users an authentication or login step is required 5030 and the data collection process is repeated 5040. If all of the required user data is collected and verified for both a new and an existing user then the user may issue a consent for a permission 5130 for each specific data item and specify for which institutions the consent is valid for. Both the customer 5100 and the institution 5200 are notified. The institution 5200 may wish to send a consent request to the customer 5200, this new consent request would initiate the process or method to begin again.
[0162]