The present invention relates to an electronic ledger system and more particularly to a stored value user identification system for crediting and debiting the ledger verifying that a user is authenticated accurately.
Humans use computers and computer networks for a wide variety of reasons. When a human uses a computer, we call that human a “User”. When a user needs to access information on a computer network, that user needs to commonly complete an authentication process to ensure that the user has permission and/or authorization to gain access to the information and other assets available on the computer or computer network. This process is called “authentication.”
Authentication is commonly executed using a system that includes a username and password, commonly referred to as Password Authentication. But, Password Authentication is not the only type of Authentication available, nor is it the most secure type of authentication.
When the user provides a username and password credentials to access an account, there is typically a time limit or token lifetime of how long the account can continually be active before the person needs to again enter a username and password to reassert their credentials. In other words, password credentials entered correctly will give the user access for predetermined and limited amount of time. In this example, when the user name and password is entered correctly, that user has an acceptable “Authentication value” during the number of minutes or hours that they are permitted to continually remain active in the account without being required to re-enter the username or password credentials. This invention expands on that idea: a user can retain the benefit of successfully presenting credentials which are valid for a period of time.
For another example: suppose an authentication system had two values for a user: zero, and one. To log into the website www.example.com, a value of zero is unacceptable for access, but a value of one is acceptable for access. When the user first attempts to access their account, the system sees that the value is zero, and therefore requests a username and password. Let's assume this particular account can remain continuously open for three hours without the need to re-enter a username and password. In this example, the authentication value would be reset to zero after the third hour has passed, and the user would be challenged to login again. This is an example of a value (instead of just a credential) used to determine if the user may gain access or not.
Stored Value systems are concept not commonly associated with Authentication. The concept of a ‘stored value’ is common in the areas of payments and credit cards and used in many applications. For example, a prepaid credit card has an initial value of zero, and is later loaded with a specific value based on funds or other credits paid into the “stored value” card, and then those funds can be used for purchases wherever that prepaid credit card is accepted until the entire stored value of card is exhausted or reloaded with additional value. This is the basic premise for ‘stored value’ authentication.
In addition to the concepts of Authentication and Stored Value, new technologies like distributed ledgers, and other math-based systems (including, but not limited to blockchain) present an opportunity to change the nature and process of authentication systems with new processes and new security methods. As an example of a distributed ledger, a blockchain has been used successfully create both security and verifiability of a given account balance. To achieve a verifiable account balance, the data in a blockchain is duplicated on many, sometimes thousands of computer systems in multiple geographic locations. To achieve security, each transaction, or small group of transactions
The present invention provides new authentication systems, processes and programs that combine elements of traditional authentication, stored value systems, and distributed ledgers like blockchain.
It is a prime object of the present invention to provide a stored value user identification system using blockchain or mathematics based function.
It is another object of the present invention to provide a stored value user identification system using blockchain or mathematics based function in which a user can retain the benefit of successfully presenting credentials for a period of time.
It is another object of the present invention to provide a user identification system using blockchain or mathematics based function which is based upon “stored value” authentication.
It is another object of the present invention to provide a stored value user identification system in which distributed ledgers, and other math-based systems (including, but not limited to blockchain), are used for storage.
It is another object of the present invention to provide a stored value user identification system using blockchain or mathematics based function in which new authentication systems, processes and programs that combine elements of traditional authentication, stored value and distributed ledgers like blockchain are utilized.
In general, the above noted objects are achieved by the present invention which relates to systems for creating a numeric value for the present certainty of a user's identity. The numerical value is recorded and ‘stored’ on a distributed ledger (including but not limited to blockchain). The numeric value is automatically modified using math-based assets (including but not limited to algorithms). The system allows multiple computer systems to debit the numeric value as part of an authentication or other process.
In accordance with one aspect of the present invention, a stored value user identification system is provided wherein a Stored Value Identifier (SVID) is established by a Trusted Entity. Once the SVID is established, an electronic account requiring access authorization is associated with the SVID such that the electronic account will recognize the SVID as a valid credential. When a User enters one or more authentication factors into the system, the system recognizes the User's valid SVID. The Trusted Entity then sends details of the authorization factors to a mathematical processor. The processor assigns a quantity of SVID Units (illustrated in
The User account is maintained on a ledger. The ledger may be present on blockchain.
The predetermined variables may include the passage of time.
The electronic account may include any account used to access a computer, a computer network or computer software. The electronic account may include an authentication directory configured to recognize the SVID as a valid credential.
The authentication factors may include different types of authentication factor(s) and may, for example, be selected from the following group: PIN number, geolocation, biometrics, tokens, period of continuous use of the system by User, number of failed authentication attempts over a given time period.
The quantity of SVID Units may be based upon User activity.
The quantity of SVID Units may be based upon the factor(s) of authentication.
The quantity of SVID Units may be a function of the strength of the factor(s) of authentication. The SVID Balance increases as the strength of factors of authentication increase.
The SVID Balance may be adjusted by an algorithm. For example, the algorithm may debit the balance of the SVID based upon the one or more of the following factors: the time the User is using a SVID, the number of times the User uses the SVID to authenticate the user, and the number of times authentication attempts are unsuccessful.
The distribution of credits to different users may be uneven. The uneven distribution may, for example, be due to one or more of the following factors: length of time User has been an account holder, frequency of use of the system, lack of negative incidents, rejected authorization attempts, fraud, and suspicious use.
The system allows a User to gain elevated status leading to increased SVID credits. For example, the elevated status may be earned by one or more of the following: longevity of use, frequency of use, and lack of negative incidents.
The system allows for multiple factors of authentication in a single event. The authentication may be available through a single portal. Different factors of authentication may be used for registration, recovery and authentication. Different factors of authentication may generate different quantities of SVID units.
The SVID may be shared among different applications and systems in the same enterprise network, or cloud network which is an extension of an enterprise network.
The SVID Balance may increase by multiple units depending upon the authentication factor. The multiple factors may be used for a single authorization.
The SVID Balances may decrease based upon multiple elements.
The system allows only Trusted Entities to credit a user's authentication value.
In accordance with another aspect of the present invention, a method of stored value user identification is provided including the following steps: establishing a SVID by a Trusted Entity; associating an electronic account requiring access authorization with the SVID such that the electronic account will recognize the SVID as a valid credential, recognizing the User's valid SVID when the User enters an authorization factor into the system;
the Trusted Entity sending details of the authorization factor to a mathematical processor; processor assigns a single quantity of SVID Units for the authorization factor; entering the assigned quantity of SVID Units into the User account, and debiting the quantity of SVID Units in User account based upon predetermined variables or use of User's SVID to authenticate User on the system.
To these and to such other objects that may hereinafter appears, the present invention relates to a stored value user identification system using blockchain or math-based function as described in detail in the following specification and recited in the annexed claims, taken together with the accompanying drawings, in which like numerals refer to like parts and in which:
This invention encompasses the entire process by which a living person (“User”) can safely establish their identity, and simultaneously produce a corresponding value for that identity based on exactly how that identity was established and reinforced. For purposes of this application, the phrases “Stored Value Identity,” or “Stored Value Identifier,” or “Stored Value ID,” or “SVID” are used to refer to an electronic ledger which tracks credits (increases to the value) and debits (deductions from the value) for a User's SVID.
Only an entity that has been approved by the system administrator or other governing body of the SVID system (a “Trusted Entity”) can apply credits to an SVID. Credits can be made by a single Trusted Entity, or multiple Trusted Entities. Each entity capable of crediting an account would need to be licensed or otherwise accredited as an entity that can be trusted, such as a bank, an insurance company, or a software company set up for that purpose.
A critical element of the present invention is that all parties that credit an SVID be trusted by a central entity such as a system administrator, or by a standard set by a government or community (the “Governing Body”). The standards set by the Governing Body will be based on criterion such as security practices, security certifications, history of fraud, history of system breaches by bad actors, history of compliance with data security laws, history of compliance with privacy laws, etc. This practice will avoid SVID's being credited by an unscrupulous, or fraudulent entity. The Governing Body can decide to limit the total number of SVID's available in a given market at a given time, and sell or trade SVIDs for other currencies.
Once established, a Trusted Entity may have a limited number of units of SVID's credited to its account. These units of SVID's will represent the sum of the units that the Trusted Entity has available to credit or debit other accounts. This number of SVID's can be adjusted automatically due to the passage of time, negative incidents related to Trusted Entity, or lack of incidents related to the Trusted Entity. SVIDs can be traded for other currency by Trusted entities and other entities.
The SVID Balance, or the number of units credited or debited based on User activity, is determined by how the user authenticates himself or herself. There are many different factors of authentication that a person can use; some factors are more accurate than others, and thus produce a SVID with a higher score. For example, a weaker factor of authentication such as a 4-digit personal identification number (PIN) will result in a smaller credit to the SVID. However, a stronger factor (or multiple factors) of authentication, such as a combination of biometrics, geolocation, and a cryptographic token used together, would result in a larger credit to the SVID.
All entities, enterprises, or computer systems that either accept an SVID for authentication, or are able to credit an SVID, must be vetted and included in a “white list” or approved list (the “Authorized Entities”) by the system administrator. All Authorized Entities, Trusted Entities, Users, and other entities can trade SVIDs for other SVIDs or other currencies.
A system algorithm is utilized to generate debits to the SVID. Debits can be generated for multiple reasons, including:
Now referring to the drawings,
As illustrated in
In Step 2, the SVID is associated with an Electronic Account so that the authorization directory of the Electronic Account will recognize the SVID as a valid credential.
The first time that the User attempts to access the Electronic Account, the Trusted Entity will require the User to complete one or more processes to complete the authorization. These processes can include, validation of user-provided data and/or mobile phone user data through mobile network operator, credit bureaus, and other third party sources.
If the authentication succeeds, the Trusted Entity sends the details of the authentication event, including the type of authentication factor(s) used (example: PIN number, geolocation, biometrics, tokens, etc.), plus other information (example: number of months of continuous use by the User, Number of Failed authentication attempts in the last three months, etc.) to the processor. In step 4, the processor uses an algorithm or other mathematical formula to assign a value to the authentication. If the authorization fails, the process does not continue, and the user is denied access.
The mathematic process (including but not limited to an algorithm) accepts as an input the information supplied by the Trusted Entity in Step 3 and produces the output of a single numeric value for the authentication at Step 4.
The numeric value generated by the processor in Step 4 is entered into the ledger (including but not limited to Blockchain) at Step 5. The ledger information entered also includes the currency type (in this case, the SVID), an identifier representing the Trusted Entity, an identifier representing the User, and other information.
At this point in the flow chart, now that a ledger entry has been made for the User's SVID, either one of two operations could happen next. Either the system algorithm will debit the SVID based on the passage of time or other factors (in Step 6a), or the User will use their SVID to authenticate themselves in whole or in part on an Authorized System (in Step 6b). In either case Step 6a or Step 6b, the ledger is debited by the value generated by the process in Step 6a or in Step 6b. In Step 6a, the algorithm reduces SVID based upon variables, as is illustrated in
In
The present invention is an improvement on conventional systems in several important ways:
System Delivery: a blockchain could be used for accounting and delivery of the credits and debits. A client or enterprise could become a blockchain miner to accept an SVID. The business model could include each minor paying a subscription or licensing fee to have access to the SVID system.
System Operations: There could be several computers and computer systems involved in the SVID transaction. The order in which each computer is used to successfully transmit the score is important. In the present invention, each computer (including but not limited to the SVID host (for example: the System Administrator), the blockchain miner, and the computing device or personal device belonging to the person who want to authenticate themselves on the blockchain miner's website. The process requires that each computer device communicate with each other computer device in a prescribed order.
While only a limited number of preferred embodiments of the present invention have been disclosed for purposes of illustration, it is obvious that many modifications and variations could be made thereto. It is intended to cover all of those modifications and variations which fall within the scope of the present invention, as defined by the following claims:
| Number | Date | Country | |
|---|---|---|---|
| 62523049 | Jun 2017 | US |