US 12,321,465 B2
System for generating an authentication credential using non-fungible tokens
Manu Jacob Kurian, Dallas, TX (US); and Michael Robert Young, Davidson, NC (US)
Assigned to BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed by BANK OF AMERICA CORPORATION, Charlotte, NC (US)
Filed on Nov. 1, 2021, as Appl. No. 17/516,193.
Prior Publication US 2023/0138797 A1, May 4, 2023
Int. Cl. G06F 16/27 (2019.01); G06F 21/60 (2013.01); H04L 9/32 (2006.01); H04L 9/00 (2022.01)
CPC G06F 21/602 (2013.01) [G06F 16/27 (2019.01); H04L 9/3213 (2013.01); H04L 9/3239 (2013.01); H04L 9/50 (2022.05)] 15 Claims
OG exemplary drawing
 
1. A system for generating Non-Fungible Token (NFT)-based authentication credentials, the system comprising:
at least one distributed trust computing network comprising a plurality of decentralized nodes, each decentralized node having a first memory and at least one first processing device in communication with the first memory, wherein the first memory of the decentralized nodes is configured to store at least one distributed ledger comprising a plurality of blocks that store data, wherein the distributed trust computing network is configured to certify that the data stored in the blocks is authentic and unaltered; and
a computing platform in communication with the distributed trust computing network and including a second memory and at least one second processing device in communication with the second memory, wherein the second memory stores a sub-system for generating authentication credentials and comprises:
an identity verification module including first instructions that are executable by the at least one second processing device and configured to:
receive first data that identifies a user and second data that identifies one or more second users, wherein the one or more second users have a familial relationship with the user, and
verify an identity of (i) the user based on the first data and (ii) the one or more second users based on the second data,
a tokenization module including second instructions that are executable by the at least one second processing device and configured to:
generate an identity-based Non-Fungible Token (NFT) that uses, as at least a portion of an input file, (i) the verified identity of the user, and (ii) the verified identities of the one or more second users, and
store the identity-based NFT as a block within a distributed ledger from amongst the at least one distributed ledger, wherein the identity-based NFT is accessible from the distributed ledger for purposes of authenticating (i) an identity of the user and (ii) lineage of the user as defined by the one or more second users, and
a familial status change monitoring module including third instructions that are executable by the at least one second processing device and configured to:
monitor for changes in familial relationships of the user, wherein the changes include an addition of a third user or a deletion of an obsolete second user,
wherein the identity verification module is further configured to:
in response to receiving indication from the familial status change monitoring module of the addition of the third user, receive third data that identifies the third user, and
verify the identity of the third user based on the third data,
wherein the tokenization module is further configured to:
in response to receiving, from the identity verification module, the verified identity of the third user, generate a first updated identity-based NFT that replaces the identity-based NFT, wherein the first updated identity-based NFT is generated based on using, as at least a portion of an input file, (i) the verified identity of the user, (ii) the verified identities of the one or more second users and (iii) the verified identity of the third user,
in response to receiving indication from the familial status change monitoring module of the deletion of the obsolete second user, generate a second updated identity-based NFT that replaces the identity-based NFT, wherein the second updated identity-based NFT is generated based on using, as at least a portion of the input file, (i) the verified identity of the user and (ii) the verified identities of the one or more second users excluding the obsolete second user.