Modern users of database systems (e.g., human resources database systems or financial database systems) rely on the database systems for access to their personal information or verification information (e.g., salary, tax details, employment status, etc. or university degree, certifications, criminal record, ownership, etc.). Users trust the database systems to contain correct information. When a user desires to provide personal information or verification information from the database system to another database system (e.g., providing previous employment or salary information to a potential employer, providing previous insurance information to a potential employer, etc.), the user typically accesses the information on the database system and then provides the information manually to the other database system (e.g., by inputting data into an electronic form or uploading digital paperwork). The user trusts the information it receives from the database system, however the other database system cannot have the same level of trust in the information it receives from the user. There is a problem in that it is difficult to trust data as it passes from system to system via a human.
Various embodiments of the invention are disclosed in the following detailed description and the accompanying drawings.
The invention can be implemented in numerous ways, including as a process; an apparatus; a system; a composition of matter; a computer program product embodied on a computer readable storage medium; and/or a processor, such as a processor configured to execute instructions stored on and/or provided by a memory coupled to the processor. In this specification, these implementations, or any other form that the invention may take, may be referred to as techniques. In general, the order of the steps of disclosed processes may be altered within the scope of the invention. Unless stated otherwise, a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task. As used herein, the term ‘processor’ refers to one or more devices, circuits, and/or processing cores configured to process data, such as computer program instructions.
A detailed description of one or more embodiments of the invention is provided below along with accompanying figures that illustrate the principles of the invention. The invention is described in connection with such embodiments, but the invention is not limited to any embodiment. The scope of the invention is limited only by the claims and the invention encompasses numerous alternatives, modifications and equivalents. Numerous specific details are set forth in the following description in order to provide a thorough understanding of the invention. These details are provided for the purpose of example and the invention may be practiced according to the claims without some or all of these specific details. For the purpose of clarity, technical material that is known in the technical fields related to the invention has not been described in detail so that the invention is not unnecessarily obscured.
A system for providing an application comprises an interface configured to receive an indication to provide an application to a device, and a processor configured to provide the application to the device. The application is configured to receive a request for credentialed information associated with a user from a requesting server, determine whether a stored credential satisfies the request for credentialed information, and in response to a determination that a stored credential satisfies the request for credentialed information: determine a response credential for responding to the request, determine that the user approves sharing the information indicated by the response credential, and provide the response credential to the requesting server.
A system for sharing credential information comprises an interface configured to receive a request for credentialed information associated with a user from a requesting server, and a processor configured to determine whether a stored credential satisfies the request for credentialed information. The processor is additionally configured to, in response to a determination that a stored credential satisfies the request for credentialed information: determine a response credential for responding to the request, determine that the user approves sharing the information indicated by the response credential, and provide the response credential to a credential verifier.
A system for sharing credentials comprises a system for a user system (e.g., a computing system for use by a user) interacting with a database system. The database system further interacts with a credential issuing system. The database system stores user information for the user. The database system further determines a set of credentials available to the user based on the user information as well as record of previously issued credentials. The credentials comprise categories satisfied by the user information at differing levels of specificity. For example, in the case where the user comprises an employee earning $95,000 per year, the database system could determine credentials available to the user indicating that the user earns more than $60,000 per year, that the user earns more than $80,000 per year, that the user earns in the range of $90,000-$100,000 per year, etc. When the user interacts with the database system using a credential requesting app or application, the database system determines the set of credentials available to the user and provides the list of credentials to the credential requesting app. The user can then request that one or more available credentials be downloaded to local storage using the credential requesting app.
When a user indicates to download a credential, a credential request is created on the user system and provided to the database system. The database system determines whether the credential is valid for the user, and in the event the credential is valid for the user, the database system requests the credential from the credential server. The credential server generates the credential and provides it to the database system. The credential server generates the credential in such a way that its validity is publicly verifiable (e.g., cryptographic keys used for verification can be found in a public or semi-public distributed ledger). The database system determines privacy information associated with the credential (e.g., a description of the personal information or verification information of the user indicated by the credential) and provides the credential and privacy information to the user system. The user system receives and stores the credential and privacy information.
When the user interacts with another system requesting personal information, a stored credential can be used to provide proof of the requested information. The requesting system issues a request including a description of the personal information or verification information requested (for example, a salary history, an employment history, a verification of health insurance coverage, etc. or university degree, certifications, criminal record, ownership, etc.). The user system receives the request and determines whether a stored credential comprises proof of the requested information. In the event multiple credentials comprise proof of the requested information, a determination of which credential to use as a response can be made manually (e.g., by prompting the user to indicate which credential to use) or automatically (e.g., by determining which credential of the multiple credentials that comprise proof of the requested information indicates the least amount of private information). The user is then provided a privacy description of the credential, indicating the private information the user is sharing by submitting the credential, and prompted to approve sharing the information. Once the user approves sharing the information, the credential is provided to the requesting system. In some embodiments, the approval comprises locally authenticating to the user system, either via a biometric or knowledge based authentication.
The requesting system verifies the credential by providing the credential to a credential verification system, and in the event the requesting system receives an indication that the credential comprises a valid response to the request for personal information, the requesting system stores an indication that the user response has been proven. The requesting system additionally provides an indication to the user system that the user response has been proven. The user system stores an indication that the credential was provided to the requesting system and that it was accepted.
By enabling the transfer of personal information or verification information between disparate database systems using verifiable credentials, this system allows that transfer of information with a level of trust and security not previously accomplished. This allows the reduction or elimination of problems such as data theft during information transfer and misrepresentation of personal information. Allowing an individual to share data in a trustworthy fashion also prevents the need to build costly system-to-system integrations AND puts individual users in control of their privacy and data.
The system is a better computer system enabling efficient secure distribution of information. For example, the system is set up to securely receive and provide information. The security protocols and the distributed ledger storage enable credentialing data and being able to act as a trusted source for the data.
In some embodiments, a technology other than a secure distributed ledger is used for securely storing public keys that enable the verifiability of data. In some embodiments, a shared accessible network accessible medium is used to distribute public keys associated with the verifiability of authenticated credentials. This shared public network could be an open model like Twitter where users tweet the public key information (keybase.io does this), or a semi-private shared database of public keys for which the participants in the credentials exchanges all have authenticated access via a set of RESTful APIs to fetch keys for credential verification.
User system 106 comprises a user system for use by a user. A user uses a user system to interact with database system 104—for example, to store database data, to request database data, to request reporting based on database data, to request a credential based on database data, etc. In some embodiments, the network system of
A user uses user system 106 to provide an indication to database system 104 requesting a credential (e.g., a credential based on data stored by database system 104). User system 106 receives login information associated with a user, determines credentials available to the user, and provides an indication of the credentials available to the user. User system 106 then receives an indication to add a credential (e.g., one of the credentials available to the user), creates a credential request, and provides the credential request to a server system (e.g., database system 104). User system 106 then receives and stores the credential.
Upon receiving the credential request, database system 104 verifies that the user has access to the credential (e.g., that the credential is valid for the user) and in the event that the user has access to the credential, database system 104 requests the credential from credential system 108. Database system 104 receives the credential from credential system 108 and provides it to user system 106.
Data requesting system 110 comprises a system requesting data from a user system. For example, data requesting system 110 comprises an application server system or a database server system for collecting user data. Data requesting system 110 collects user data as part of an application for employment, housing, health insurance, etc. When user system 106 receives the request for user data (e.g., a request for credentialed information associated with a user), user system 106 then determines whether a stored credential satisfies the request for credentialed information. In response to a determination that a stored credential satisfies the request for credentialed information, user system 106 is configured to determine a response credential for responding to the request, determine that the user approves sharing the information indicated by the response credential, and provide the response credential to the requesting server.
Database system 200 receives a request for a credential associated with a user (e.g., a user for the credential) and associated with a credential identifier (e.g., a credential identifier identifying the requested credential). Database system 200 then determines that the credential identifier is valid for the user (e.g., that the user is entitled to the indicated credential), determines privacy information associated with the requested credential, and provides the credential request to a credential server. Database system 200 receives the credential from the credential server and provides the credential, the privacy information, and the credential identifier (e.g., to the requesting user system).
Credential sharing application 410 is configured to receive a request for credentialed information associated with a user from a requesting server and determine whether a stored credential (e.g., a stored credential stored in credential wallet 418) satisfies the request for credentialed information. In response to a determination that a stored credential satisfies the request for credentialed information, credential sharing application 410 is configured to determine a response credential (e.g., a response credential of a set of credentials that satisfy the request for credentialed information) for responding to the request, determine that the user approves sharing the information indicated by the response credential (e.g., by prompting the user for their approval), and provide the response credential to the requesting server.
Although the foregoing embodiments have been described in some detail for purposes of clarity of understanding, the invention is not limited to the details provided. There are many alternative ways of implementing the invention. The disclosed embodiments are illustrative and not restrictive.
This application is a continuation of U.S. patent application Ser. No. 16/021,240 entitled SHARING CREDENTIALS filed Jun. 28, 2018, which claims priority to U.S. Provisional Patent Application No. 62/648,854 entitled SYSTEM FOR ISSUANCE, VERIFICATION, AND REVOCATION OF CREDENTIALS filed Mar. 27, 2018, both of which are incorporated herein by reference for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
6662299 | Price, III | Dec 2003 | B1 |
7437755 | Farino | Oct 2008 | B2 |
7735120 | Wallace | Jun 2010 | B2 |
8719952 | Damm-Goossens | May 2014 | B1 |
8745718 | Dufel | Jun 2014 | B1 |
9374368 | Roth | Jun 2016 | B1 |
9419968 | Pei | Aug 2016 | B1 |
9485096 | Shrivastava | Nov 2016 | B2 |
9490984 | Leicher | Nov 2016 | B2 |
9672538 | Vaynblat | Jun 2017 | B1 |
9749140 | Oberhauser | Aug 2017 | B2 |
10360363 | Grosberg | Jul 2019 | B1 |
10460313 | Clark | Oct 2019 | B1 |
20020176583 | Buttiker | Nov 2002 | A1 |
20040162985 | Freeman | Aug 2004 | A1 |
20040177276 | MacKinnon | Sep 2004 | A1 |
20060200856 | Salowey | Sep 2006 | A1 |
20080148373 | Adams | Jun 2008 | A1 |
20080301553 | Basu | Dec 2008 | A1 |
20090119756 | Acuna | May 2009 | A1 |
20110113484 | Zeuthen | May 2011 | A1 |
20120079570 | Fu | Mar 2012 | A1 |
20130030989 | Geller | Jan 2013 | A1 |
20130125231 | Kuenzi | May 2013 | A1 |
20140002236 | Pineau | Jan 2014 | A1 |
20140075515 | McColgan | Mar 2014 | A1 |
20140079221 | Mccallum | Mar 2014 | A1 |
20140096213 | Quan | Apr 2014 | A1 |
20140181927 | Sarkissian | Jun 2014 | A1 |
20140187149 | Lortz | Jul 2014 | A1 |
20140222682 | Dua | Aug 2014 | A1 |
20140281525 | Acar | Sep 2014 | A1 |
20140373117 | Le Saint | Dec 2014 | A1 |
20150089244 | Roth | Mar 2015 | A1 |
20150278500 | Burch | Oct 2015 | A1 |
20150278824 | Zabar | Oct 2015 | A1 |
20150288694 | Liebl, III | Oct 2015 | A1 |
20150350913 | Eberwine | Dec 2015 | A1 |
20160149896 | Sarkissian | May 2016 | A1 |
20160162896 | Grigg | Jun 2016 | A1 |
20160255079 | Harrison | Sep 2016 | A1 |
20160330027 | Ebrahimi | Nov 2016 | A1 |
20170005804 | Zinder | Jan 2017 | A1 |
20170005809 | Adam | Jan 2017 | A1 |
20170012784 | Cross | Jan 2017 | A1 |
20170041151 | Kommireddy | Feb 2017 | A1 |
20170109759 | Korb | Apr 2017 | A1 |
20170126661 | Brannon | May 2017 | A1 |
20170155626 | Li | Jun 2017 | A1 |
20170155686 | Yanacek | Jun 2017 | A1 |
20170180128 | Lu | Jun 2017 | A1 |
20170222814 | Oberhauser | Aug 2017 | A1 |
20170250972 | Ronda | Aug 2017 | A1 |
20170257358 | Ebrahimi | Sep 2017 | A1 |
20170277773 | Iasi | Sep 2017 | A1 |
20170302659 | Shteingart | Oct 2017 | A1 |
20170317997 | Smith | Nov 2017 | A1 |
20170338967 | Lewison | Nov 2017 | A1 |
20170372055 | Robinson | Dec 2017 | A1 |
20180075247 | Campero | Mar 2018 | A1 |
20180124041 | Bhalerao | May 2018 | A1 |
20180144563 | Reymann | May 2018 | A1 |
20180159839 | Citron | Jun 2018 | A1 |
20180167394 | High | Jun 2018 | A1 |
20180248859 | Zudic | Aug 2018 | A1 |
20190036710 | Qiu | Jan 2019 | A1 |
20190164156 | Lindemann | May 2019 | A1 |
20190230073 | Patel | Jul 2019 | A1 |
20190230092 | Patel | Jul 2019 | A1 |
20190363889 | Wang | Nov 2019 | A1 |
20200145219 | Sebastian | May 2020 | A1 |
Number | Date | Country |
---|---|---|
2606326 | Nov 2006 | CA |
19882328 | May 2014 | DE |
2010083522 | Jul 2010 | WO |
2017085546 | May 2017 | WO |
2017127564 | Jul 2017 | WO |
Entry |
---|
Andrew Tobin, “Sovrin :What Goes on the Ledger”, white paper, Apr. 2017. |
Reed et al.,: “Decentralized Identifiers (DIDs) v0.9”, Feb. 12, 2018 (Feb. 12, 2018), XP055855370, Retrieved from the Internet: URL: https://web.archive.org/web/20180212212114/https://w3c-ccg.github.io/did-spec/#proof-optional [retrieved on Oct. 27, 2021]. |
The Sovrin Foundation, “Sovrin™: A Protocol and Token for SelfSovereign Identity and Decentralized Trust”, white paper, Jan. 2018. |
Windley et al.: “Sovrin (TM): A Protocol and Token for Self- Sovereign Identity and Decentralized Trust A White Paper from the Sovrin Foundation”, White Paper, Jan. 1, 2018 (Jan. 1, 2018), pp. 1-42, XP055648450, US, Retrieved from the Internet: URL: https://sovrin.org/wp-content/uploads/Sovrin-Protocol-and-Token-White-Paper.pdf [retrieved on Dec. 2, 2019]. |
Ori Jacobovitz. “Blockchain for identity management.” The Lynne and William Frankel Center for Computer Science Department of Computer Science. Dec. 2016 (Dec. 2016) Retrieved on May 27, 2019 from https://www.cs.bgu.ac.il/˜frankel/TechnicalReports/2016/16-02.pdf. |
Number | Date | Country | |
---|---|---|---|
20210336943 A1 | Oct 2021 | US |
Number | Date | Country | |
---|---|---|---|
62648854 | Mar 2018 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 16021240 | Jun 2018 | US |
Child | 17233224 | US |