| CPC G06F 21/32 (2013.01) [G06F 21/602 (2013.01); H04L 9/083 (2013.01); G06F 2221/2141 (2013.01)] | 8 Claims |

|
1. A data management system for securely managing data transactions, the system comprising a computing system which incorporates:
(i) a public key distribution system which is configured to distribute a public key of a public/private key pair for each respective party using the system;
(ii) a trusted storage system which is in communication with the public key distribution system, the trusted storage system being configured to store a record for each respective party using the system, each record comprising a unique identifier and a public key for a respective party using the system; and
(iii) a verification system which is in communication with the public key distribution system and the trusted storage system, the verification system being configured to check the identity of a party seeking to participate in a transaction involving an exchange of data, wherein:
(a) if the verification system is not able to verify the identity of the party seeking to participate in the transaction, the verification system prevents the transaction from being carried out, and (b) if the verification system is able to verify the identity of the party seeking to participate in the transaction, the verification system permits the transaction to be carried out and the trusted storage system stores a transaction record comprising a record of the transaction and a record of the party participating in the transaction, and wherein the verification system is configured to check the identity of a party based on the result of a biometric check:
further wherein the verification system is configured to calculate a trust score which is indicative of a level of trust between a first party and a second party based on a public key of the second party, wherein the trust score is a first value if the verification system verifies the public key of the second party successfully and the trust score is a second value if the verification system cannot verify the public key of the second party, and the trusted storage system is configured to store the trust score, and wherein the verification system is configured to parse data stored by the trusted storage and generate a graph of nodes corresponding to parties and edges connecting the nodes, each edge representing a trust score of a trust relationship between two nodes, and wherein the verification system is configured to traverse the graph and calculate an aggregated trust score based on trust scores represented by a plurality of the edges, and wherein the verification system is configured to check the identity of human parties based on the result of a biometric check.
|