Email address with identity string and methods of use
11503026 · 2022-11-15
Inventors
Cpc classification
H04L63/0442
ELECTRICITY
H04L63/0884
ELECTRICITY
H04L9/0866
ELECTRICITY
H04L51/48
ELECTRICITY
H04L63/1483
ELECTRICITY
H04L51/56
ELECTRICITY
International classification
H04L9/32
ELECTRICITY
H04L51/56
ELECTRICITY
Abstract
A system for authentication having an authentication protocol to communicate with the hardware device, the authentication protocol having an encryption function having a hardware key and a software key, a private and a public key pair, the key pair generated from the hardware key and the software key, used to encrypt the communication between the server and the client, an identity authentication service to assign a user of the hardware device to an identity string, and creates a unique user email address based on the identity string and an authentic email server domain, and a target service having a user identity data and comparing the user identity data to the email string, and if the user identity data and the email string match, then the target service accepts the unique user email address to send a service event communication to the hardware device.
Claims
1. A system for digital identity authentication, said system comprising: a server for data and email; a client on a hardware device in communication with said server; said server having an authentication protocol to communicate with said hardware device, said authentication protocol having an encryption function having a hardware key and a software key, a private and a public key pair, said key pair generated from said hardware key and said software key, used to encrypt the communication between said server and said client, said encryption function is a format-preserving encryption, said format-preserving encryption utilizes integers followed by a decimal to a hexatrigesimal conversion; an identity authentication service to assign a user of said hardware device to an identity string, and creates a unique user email address based on said identity string and an authentic email server domain, said identity string is encrypted with a key; and a target service having a user identity data and comparing said user identity data to an email string, and if said user identity data and said email string match, then said target service accepts said unique user email address to send a service event communication to said hardware device.
2. The system of claim 1, wherein said identity string is a country code and a national identification number.
3. The system of claim 1, wherein said identity string is a temporary identity string, said temporary identity string is a driver's license or phone number.
4. The system of claim 1, wherein said identity string links to additional identity data on said authentic email server domain.
5. The system of claim 1, wherein a personal attribute data is added to said identity string.
6. The system of claim 1, wherein said key is generated from an account data provided by said user to said target service.
7. The system of claim 1, wherein said service event communications are selected from the group including an account opening, a login event, a user name, a password change events and combinations thereof.
8. The system of claim 1, wherein said server provides anti-phishing screening of said service event communications from a service requiring an identity monitoring.
9. The system of claim 1, wherein said hardware device displays said service event communications from said target service requiring said identity monitoring on a client dashboard.
10. The system of claim 1, wherein said user registers a text messaging number with said target service and said server integrates a text communication with said client.
11. The system of claim 1, wherein said target service is an age restricted service.
12. The system of claim 1, wherein said key is deleted after completion of said identity authentication service.
13. A computer implemented method for digital identity authentication, said method comprising the steps of: providing a server for data and email, a client on a hardware device in communication with said server, said server having an authentication protocol to communicate with said hardware device, said authentication protocol having an encryption function having a hardware key and a software key, a private and a public key pair, said key pair generated from said hardware key and said software key, used to encrypt the communication between said server and said client, said encryption function is a format-preserving encryption, said format-preserving encryption utilizes integers followed by a decimal to a hexatrigesimal conversion; utilizing an identity authentication service to assign a user of said hardware device to an identity string, said identity string is encrypted with a key; creating a unique user email address based on said identity string and an authentic email server domain; enabling a target service to access a user identity data; comparing said user identity data to an email string by said target service, and if said user identity data and said email string match; and accepting said unique user email address to send a service event communication via said target service to said hardware device.
14. The method of claim 13, wherein said identity string is a country code and a national identification number.
15. The method of claim 13, wherein said identity string is a temporary identity string, said temporary identity string is a driver's license or phone number.
16. The method of claim 13, wherein said identity string links to additional identity data on said authentic email server domain.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The present system to provide Email Address with Identity String and Methods of Use will be better understood by reading the Detailed Description of exemplary embodiments with reference to the accompanying drawing figures, in which like reference numerals denote similar structure and refer to like elements throughout, and in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8) It is to be noted that the drawings presented are intended solely for the purpose of illustration and that they are, therefore, neither desired nor intended to limit the disclosure to any or all of the exact details of construction shown, except insofar as they may be deemed essential to the claimed invention.
DETAILED DESCRIPTION
(9) In describing the exemplary embodiments of the present disclosure, as illustrated in
(10) In order to understand the present disclosure certain variables and terms need to be defined, such as “Identity Verification”, “Identity Validation” and “Identity Authentication”, which are often used interchangeably, but actually have subtle differences in meaning.
(11) Identity (data) Validation means ensuring that identity data represents real data, for example ensuring that a particular Social Security Number has not been issued by the Social Security Administration to another individual.
(12) Identity (data) Verification means ensuring that identity data is associated with a particular individual, for example matching date of birth and address to an individual's name.
(13) Identity (person) Authentication refers to a process of determining that an individual is who they claim to be by a comparison of a passport picture (or other government issued document and credentials) with visual inspection of the person handing over the passport.
(14) As will be appreciated by one of skill in the art, the present disclosure may be embodied as a method, data processing system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, entirely software embodiment or series of instructions or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product on a computer-readable storage medium having computer-readable program code means embodied in the medium. Any suitable computer readable medium may be utilized, including hard disks, ROM, RAM, CD-ROMs, electrical, optical, magnetic storage devices and the like.
(15) The present disclosure is described below with reference to flowchart illustrations of methods, apparatus (systems) and computer program products according to embodiments of the present disclosure. It will be understood that each block or step of the flowchart illustrations, and combinations of blocks or steps in the flowchart illustrations, can be implemented by computer program instruction(s) or operation(s). These computer program instructions or operations may be loaded onto a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions or operations, which execute on the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart block or blocks/step or steps.
(16) These computer program instructions or operations may also be stored in a computer-usable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions or operations stored in the computer-usable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart block or blocks/step or steps. The computer program instructions or operations may also be loaded onto a computer or other programmable data processing apparatus (processor) to cause a series of operational steps to be performed on the computer, provide software as a service, or other programmable apparatus (processor) to produce a computer implemented process such that the instructions or operations which execute on the computer or other programmable apparatus (processor) provide steps for implementing the functions specified in the flowchart block or blocks/step or steps.
(17) Accordingly, blocks or steps of the flowchart illustrations support combinations of means for performing the specified functions, combinations of steps for performing the specified functions, and program instruction means for performing the specified functions. It should also be understood that each block or step of the flowchart illustrations, and combinations of blocks or steps in the flowchart illustrations, can be implemented by special purpose hardware-based computer systems, which perform the specified functions or steps, or combinations of special purpose hardware and computer instructions or operations or provided as computer application, software, software platform, software as a service.
(18) Computer programming for implementing the present disclosure may be written in various programming languages, database languages, and the like. However, it is understood that other source or object oriented programming languages, and other conventional programming language may be utilized without departing from the spirit and intent of the present disclosure.
(19) Moreover, hardware-based computer systems, which perform the specified functions or steps, or combinations of special purpose hardware and computer instructions or operations or provided as computer application, software, software platform, software as a service for authentication and identification communication, including biometric authentication, between an authentication provider, a service provider or requestor, and a consumer or user, for facilitating authentication and identification communication, including biometric authentication, between an authentication provider, a service provider or requestor, and a consumer or user, for providing alerts and notifications regarding potential fraud and potential identity theft, for arranging secure authentication of personal data or the ability to watermark users data (marked with a digital signature including name, and/or invariant of the verified user who uploaded the content), such as data in requests to open banking, credit, credit card, loan, financial, telecommunications and utility accounts; DNA services, honest advertising, honest news (true identification of reports to news stories to prevent fake news)—publishing content under user's name/invariant, protecting generic data/information, individual is allowed to view/share/encrypt/decrypt their data on a 3rd party system) including FACEBOOK, YAHOO, GOOGLE DRIVE, DROP BOX, IRS, IRS's individual taxpayer authentication numbers, and the like.
(20) Moreover, computer programming and hardware for implementing the present disclosure may be in the form of a piece of licensing hardware and/or software or deployed as an identity license server to 3rd parties who can then use it to register, identify and authenticate individuals or individual access.
(21) Referring now to
(22) The plurality of memory components 104, 106 may be embodied on a single computing device 10 or distributed across a plurality of computing devices. In various embodiments, memory may comprise, for example, a hard disk, random access memory, cache memory, flash memory, a compact disc read only memory (CD-ROM), digital versatile disc read only memory (DVD-ROM), an optical disc, circuitry configured to store information, or like hardware, or some combination thereof. Memory 104, 106 may be configured to store information, data, applications, instructions, or the like for enabling the computing device 10 to carry out various functions in accordance with example embodiments discussed herein. For example, in at least some embodiments, memory 104, 106 is configured to buffer input data for processing by processor 102. Additionally or alternatively, in at least some embodiments, memory 104, 106 may be configured to store program instructions for execution by processor 102. Memory 104, 106 may store information in the form of static and/or dynamic information. This stored information may be stored and/or used by the computing device 10 during the course of performing its functionalities.
(23) Many other devices or subsystems or other I/O devices 212 may be connected in a similar manner, including but not limited to, devices such as microphone, speakers, flash drive, CD-ROM player, DVD player, printer, main storage device 214, such as hard drive, and/or modem each connected via an I/O adapter. Also, although preferred, it is not necessary for all of the devices shown in
(24) In some embodiments, some or all of the functionality facilitating email exchanges and/or transactions may be performed by processor 102. In this regard, the example processes and algorithms discussed herein can be performed by at least one processor 102. For example, non-transitory computer readable storage media can be configured to store firmware, one or more application programs, and/or other software, which include instructions and other computer-readable program code portions that can be executed to control processors of the Email Address with Identity String and System or Platform 201 to implement various operations, including the examples shown above. As such, a series of computer-readable program code portions may be embodied in one or more computer program products and can be used, with a computing device, server, and/or other programmable apparatus, to produce the machine-implemented processes discussed herein.
(25) Any such computer program instructions and/or other type of code may be loaded onto a computer, processor or other programmable apparatuses circuitry to produce a machine, such that the computer, processor or other programmable circuitry that executes the code may be the means for implementing various functions, including those described herein.
(26) Referring now to
(27) Similar to user 220, 222, 224, server system 260 preferably includes a computer-readable medium, such as random access memory, coupled to a processor. The processor executes program instructions stored in memory. Server system 260 may also include a number of additional external or internal devices, such as, without limitation, a mouse, a CD-ROM, a keyboard, a display, a storage device and other attributes similar to computer system 10 of
(28) It is contemplated herein that communication system or platform 201 may be implemented on a custom built hardware device.
(29) Communications system or platform 201 is capable of delivering and exchanging data between user 220, 222, 224 and a server system 260 through communications link 240 and/or network 250. Through user 220, 222, 224, users can preferably communicate over network 250 with each other user 220, 222, 224, and with other systems and devices, such as server system 260, to electronically collect, transmit, manipulate, display, store, print and/or view bettor data utilizing betting level of profitability system 301 (see
(30) It is contemplated herein that RAM 104, main storage device 214, and database 270 may be referred to herein as storage device(s) or memory device(s).
(31) In order to understand the present disclosure certain user terms need to be defined. Individual means a person or entity who wants to disclose their true (identity editor certified) identity to a requestor. Identity server means a computer program that manages access to a centralized resource or service in a network. Identity editor means a person or automated service authorized to perform certain legal formalities, especially to identify an individual, draw up or certify contracts, deeds, and other documents for use in other jurisdictions. A public identifier is a unique invariant data string (such as Social Security Number) which denotes the single individual who is a member of a class of people (such as citizens of a country) that is to be identified individually. Requestor means a person or entity or automated service who wants to verify if the encrypted (identity editor certified) identity matches the public identifier or an automated login server-response challenge, such as a computer program or system that verifies if the encrypted (identity editor certified) public identifier matches the public identifier. A multi factor authentication protocol requires not only a password and username but also something that only that user has on them—such as a physical token (hardware device). U2F means “universal two factor”, a specific 2FA encryption standard technical implementation.
(32) Public keys are one half of the mathematically-related pairs consisting of private key and public key pairs in asymmetric encryption for all users. They are managed in a key infrastructure which is a set of roles, policies and procedures needed to create, manage, distribute, use, store and revoke digital certificates (ownership keys) and manage encryption. In our case, the key infrastructure is highly restrictive so that only paired user accounts distribute public keys to each other within identity server, as in paired accounts between an identity editor and an individual who have formed a business relationship in the system for digital identity authentication. Specifically, the key infrastructure manages the identity editor key in order to decrypt the paired individual's public identifier as part of the authentication process.
(33) Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are simply large numbers that have been paired together but are not identical (asymmetric). One key in the pair, a public key, can be shared (. The other key in the pair is kept secret; it is called the private key. Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption. When the private key is used for encryption it is typically called “signing”. This means others can verify who the person is who ‘signed’ the message or verify who the person is who ‘signed-off on a transaction because they can use the signers’ public key to decrypt. If that doesn't work, the individual was not the one who sent the message. The entire message can be encrypted/signed, or, more commonly just the hash is encrypted/signed due to the inefficiency of private key encryption in the case of large messages. A hash is a unique string (e.g. base 64) or (HEX) number that uniquely represents the message. For simplicity, private key encryption in this document may refer to signing hashes as well as complete messages. When the public key is used for encryption it is called “encryption”. In this case individual's private key (with hardware token) can be used to decrypt. Hashes can also be used to transform a unique string (like Social Security Number or other identification number) into another unique string without the ability to invert the process.
(34) Moreover, Email Address with Identity String and System or Platform 201 may be utilized to improve, simplify, and facilitate digital identity verification, control, and ownership in a secure and efficient manner between a number of parties.
(35) U2F can also encrypt conditionals (indirectly through a handle). U2F provides 2 factor authorization solves the problem of phishing, cloning. It issues physical devices (which can be replaced) to store private digital keys to all actors. These private keys are then used in the encryption process and they have a 30 s refresh time. So the pins are always changing depending on atomic clock time. This reduces the need to issue new keys often. The private keys are not stored inside of the server, so even in the case of an “inside job” nobody can establish new user/editor pairs. The server is configured to store all the public keys that are paired with the private keys before they are issued to users. Public keys can only be used to decrypt messages.
(36) To the full extent permitted by law, the present United States Provisional patent application incorporates herein by reference in their entirety U.S. Non-Provisional application Ser. No. 16/260,103, filed on Jan. 29, 2019, entitled “System for Digital Identity Authentication and Methods of Use, U.S. Non-Provisional application Ser. No. 16/190,634, filed on Nov. 14, 2018, entitled “System for Digital Identity Authentication and Methods of Use, U.S. Provisional Application No. 62/586,237, filed on Nov. 15, 2017, entitled “Digital Identity Verification & Authentication System and Methods of Use.
(37) Referring now to
(38) Referring now to
(39) On the basis that the information on the trueme.online service is authenticated, it is now also possible to create hashes that combine the identity string with a type of information. These hashes can now be used as links to display specific information about John Tester, user 220. For instance, if a service scans the hash as a QR code his picture with designation 21+ can be downloaded from the trueme.online server to identify John Tester, user 220 and verify he is of age 21.
(40) It is contemplated herein that identity string or temporary identity string may include SSN, National Identification Number, Drivers License, 9 Digit ZIP Code, Phone number, text messaging number, text message, Credit card number, Insurance card number, 7 digits of DOB, Country Code and the like as shown in
(41) Referring now to
(42) In cryptography, format-preserving encryption (FPE), refers to encrypting in such a way that the output (the ciphertext) is in the same format as the input (the plaintext). The meaning of “format” varies. The format-preserving encryption may utilize integers followed by a decimal to a hexatrigesimal conversion.
(43) Referring now to
(44) Referring now to
(45) Referring now to
(46) Referring now to
(47) Referring now to
(48) Referring now to
(49) Referring now to
(50) Referring now to
(51) Referring now to
(52) Referring now to
(53) Referring now to
(54) Referring now to
(55) Referring now to
(56) Referring now to
(57) Referring now to
(58) There are two use cases in
(59) In the case of credit card numbers (
(60) Email Syntax (see reference https://en.wikipedia.org/wiki/Email_address, incorporated herein by reference)
(61) The format of email addresses is local-part@domain where the local-part may be up to 64 characters long and the domain may have a maximum of 255 characters. The formal definitions are in RFC 5322 (sections 3.2.3 and 3.4.1) and RFC 5321—with a more readable form given in the informational RFC 3696[5] and the associated errata, incorporated herein by reference. Note that unlike the syntax of RFC 1034,[6] and RFC 1035[7] there is no trailing period in the domain name.
(62) Local-Part
(63) The local-part of the email address may use any of these ASCII characters: uppercase and lowercase Latin letters A to Z and a to z; digits 0 to 9; printable characters !#$%&′*+−/=?{circumflex over ( )}_′{|}˜; dot ., provided that it is not the first or last character unless quoted, and provided also that it does not appear consecutively unless quoted (e.g. John..Doe@example.com is not allowed but “John..Doe”@example.com is allowed); [8]
(64) With this syntax it is possible to encode 99 numbers from base 10 (digits) to base 36 (digits and letters) in the 64 character string of the local-part of the email address.
(65) Test of encrypted email addresses.
(66) Successful test on BANK OF AMERICA account using the following process (not real numbers)
(67) Steps: SSN (e.g 559835762), DOB (1123960) so 5598357621123960 Convert to HEX number 13e3ad35552b78 Add flag for type of ID and verification state Flag(ab), so unverified SSN: ab13e3ad35552b78 For example, Encrypt with Blowfish 32 character output key=avdvldn Blow Fish can be found here—https://webnet77.net/cgi-bin/helpers/blowfish.pl
(68) Result:
(69) BE85D1E256953469C851FA69A424AC53
(70) Also this is 32 characters, email allows up to 64 characters. Also the problem is that (say for Bank) you have to verify the email address by typing it in by hand—32 characters is ok, but 64 characters is useable but may be getting to long for a typical user.
(71) Referring now to
(72) Referring now to
(73) Referring now to
(74) John Test Case, user 220 also then changed it again back to John Test Case, user 220 previous email account with BANK OF AMERICA and got a similar Warning from my bank on the encrypted yahoo email BE85D1E256953469C851FA69A424AC53@yahoo.com. This is the type of event Email Address with Identity String and System or Platform 201 will capture in case of account takeover.
(75) It is contemplated herein that a target service using Email Address with Identity String and System or Platform 201 can also verify the ownership of a credit card online wherein the credit card may replace or be added to the string like SSN.
(76) Spam Filtering:
(77) Target Services, such as BANK OF AMERICA, originated emails have specific email servers with known domains. Emails from authentic domains can be parsed or filtered to allow authentic communications to pass on as emails to users, John Test Case, user 220 and all other email communications blocked as spam and held for holding period in case determined authentic.
(78) In an email click: File, Properties, and review Internet Header
(79) E.g. Bank:
(80) From: “BANK OF AMERICA”<onlinebanking@ealerts.bankofamerica.com>
(81) Received: from [68.232.194.1] ([68.232.194.1:49005] helo=ealerts.bankofamerica.com)
(82) Return-Path: bounce-29_HTML-585239018-1472384-73720-30@bounce.ealerts.bankofamerica.com
(83) E.g. Credit Card:
(84) Received: from [52.27.255.238] ([52.27.255.238:49239] helo=mta1a2.c1-t.msyscloud.com) by smtp15.gate.ord1d.rsapps.net (envelope-from <bounce-400000014073019598@notification.capitalone.com>)
(85) From: “Capital One”<capitalone@notification.capitalone.com>
(86) X-MS-Exchange-Organization-Network-Message-Id: bd6e54af-76fb-4a2a-ac47-08d6c30034de
(87) Return-Path: bounce-400000014073019598@notification.capitalone.com
(88) X-Spam-Threshold: 95
(89) The illustrations described herein are intended to provide a general understanding of the structure of various embodiments. The illustrations are not intended to serve as a complete description of all of the elements and features of apparatus, processors, and systems that utilize the structures or methods described herein. Many other embodiments may be apparent to those of skill in the art upon reviewing the disclosure. Other embodiments may be utilized and derived from the disclosure, such that structural and logical substitutions and changes may be made without departing from the scope of the disclosure. Additionally, the illustrations are merely representational and may not be drawn to scale. Certain proportions within the illustrations may be exaggerated, while other proportions may be minimized. Accordingly, the disclosure and the figures are to be regarded as illustrative rather than restrictive.
(90) The above disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover all such modifications, enhancements, and other embodiments, which fall within the true spirit and scope of the description. Thus, to the maximum extent allowed by law, the scope is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.
(91) The foregoing description and drawings comprise illustrative embodiments of the present disclosure. Having thus described exemplary embodiments, it should be noted by those of ordinary skill in the art that the within disclosures are exemplary only, and that various other alternatives, adaptations, and modifications may be made within the scope of the present disclosure. Merely listing or numbering the steps of a method in a certain order does not constitute any limitation on the order of the steps of that method. Many modifications and other embodiments of the disclosure will come to mind to one ordinarily skilled in the art to which this disclosure pertains having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Although specific terms may be employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation. Moreover, the present disclosure has been described in detail; it should be understood that various changes, substitutions and alterations can be made thereto without departing from the spirit and scope of the disclosure as defined by the appended claims. Accordingly, the present disclosure is not limited to the specific embodiments illustrated herein, but is limited only by the following claims.