| CPC H04L 63/102 (2013.01) [G06F 16/2255 (2019.01)] | 17 Claims |

|
1. A method comprising:
receiving, by a server computer, from a first authorizing entity computer, a location of a first hash of information about a user after the user uses a user device to provide the information about the user to the first authorizing entity computer and after the first authorizing entity computer forms the first hash by hashing the information about the user provided by the user device, wherein the user or information about the user has been verified by the first authorizing entity computer, and the first hash is stored in a first database that is shared between the first authorizing entity computer and the server computer, and wherein the verified information about the user is stored by the first authorizing entity computer in a verification database along with an indication that the user has been verified;
storing, by the server computer, the location of the first hash in the first database, an identifier for the user, and a type of the information about the user, in a location database, the first database being separate and distinct from the location database, wherein the first database is a distributed ledger and the location database is not a distributed ledger;
receiving, by the server computer, from a second authorizing entity computer, a verification request message about the user, the verification request message comprising a second hash of information about the user, the identifier for the user and the type of the information about the user;
determining, by the server computer, the location of the first hash in the first database using the identifier for the user and the type of the information about the user;
retrieving, by the server computer, the first hash from the first database using the location of the first hash;
comparing, by the server computer, the first hash to the second hash to determine if the first hash and the second hash match;
determining, by the server computer, that the first hash and the second hash match;
determining, by the server computer, a trust score associated with the first authorizing entity computer; and
responsive to determining that the first hash and the second hash match, sending, by the server computer, a verification response message to the second authorizing entity computer, the verification response message comprising verification data that the user was previously verified and the trust score associated with the first authorizing entity computer.
|