US 12,335,260 B2
Unified identification verification system
Josiah Johnson Umezurike, Columbia, SC (US)
Filed by Josiah Johnson Umezurike, Columbia, SC (US)
Filed on Mar. 30, 2023, as Appl. No. 18/193,538.
Application 18/193,538 is a continuation in part of application No. 16/697,157, filed on Nov. 26, 2019, granted, now 11,367,065, issued on Jun. 21, 2022.
Application 16/697,157 is a continuation of application No. 16/393,956, filed on Apr. 24, 2019, granted, now 10,999,276, issued on May 4, 2021.
Application 16/393,956 is a continuation of application No. 15/875,378, filed on Jan. 19, 2018, granted, now 10,911,217, issued on Feb. 2, 2021.
Application 16/393,956 is a continuation of application No. 13/364,339, filed on Feb. 2, 2012, abandoned.
Prior Publication US 2023/0247022 A1, Aug. 3, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/0876 (2013.01) [H04L 63/0823 (2013.01); H04L 63/0861 (2013.01); H04L 63/102 (2013.01)] 13 Claims
OG exemplary drawing
 
1. A system, comprising:
a processor of an ID verification node connected to at least one node over a network;
a memory on which are stored machine-readable instructions that when executed by the processor, cause the processor to:
acquire verifiable ID scan image data of all users within a country of residence;
receive users' profile data;
generate encrypted user profile attributes comprising DNA;
execute a transaction to store the encrypted user profiles on a ledger along with corresponding access policies;
generate an intermediate representation for each user based on the verifiable ID scan image data and the encrypted user profile attributes;
wherein the instructions further cause the processor to generate an alphanumeric special character string based on user profile data and to generate a shadow string of the alphanumeric special character string;
wherein the shadow string includes in intermediate representation comprising QR code with a specified access policy; and
wherein the instructions further cause the processor to generate a stripped shadow UWA and to send the stripped shadow UWA to a client, wherein the client performs a mutual authentication by using a subset of characters to get or post a request to the ID verification node.