US 12,437,299 B2
Trusted customer identity systems and methods
Clifford F. Boyle, Scottsdale, AZ (US); and Robert E. Mcgill, Rumson, NJ (US)
Assigned to SHAZZLE, LLC, Weymouth, MA (US)
Filed by SHAZZLE, LLC, Weymouth, MA (US)
Filed on Apr. 24, 2020, as Appl. No. 16/858,052.
Claims priority of provisional application 62/838,490, filed on Apr. 25, 2019.
Prior Publication US 2020/0342459 A1, Oct. 29, 2020
Int. Cl. G06Q 20/40 (2012.01); G06Q 20/16 (2012.01); G06Q 20/30 (2012.01); G06Q 20/32 (2012.01); G06Q 20/38 (2012.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01)
CPC G06Q 20/4014 (2013.01) [G06Q 20/16 (2013.01); G06Q 20/305 (2013.01); G06Q 20/322 (2013.01); G06Q 20/3823 (2013.01); G06Q 20/3829 (2013.01); H04L 9/0822 (2013.01); H04L 9/0825 (2013.01); H04L 9/0891 (2013.01); H04L 9/3213 (2013.01); H04L 9/3226 (2013.01); H04L 63/0428 (2013.01); H04L 63/0861 (2013.01); H04L 63/0876 (2013.01); H04L 63/126 (2013.01); G06Q 2220/00 (2013.01); H04L 2209/56 (2013.01)] 21 Claims
OG exemplary drawing
 
1. An identity verification method for linking a receiving computer, a secure token, and an initiating computer for establishing a trusted customer network of users to conduct a transaction, the method comprising:
a. registering the receiving computer, wherein the registering comprises:
1) downloading, by the receiving computer, an identity verification software application;
2) creating, by the receiving computer, an encryption key pair, the key pair including a receiving computer public key and a receiving computer private key;
3) storing, by the receiving computer, the receiving computer private key;
4) sending, from the receiving computer to a registry server, an authentication message over a communications network, the authentication message including unique receiving computer identifying information and the receiving computer public key to register the receiving computer in a registry database of the registry server;
b. vetting, by the initiating computer, the receiving computer, wherein the vetting comprises:
1) sending an electronic request from the receiving computer to an initiating computer to vet the receiving computer for inclusion in the trusted customer network of users, wherein the electronic request includes unique receiving computer identifying information;
2) sending the electronic request from the initiating computer to the registry server;
3) checking a member registry to confirm that the receiving computer and the initiating computer are members of the trusted customer network of users;
c. providing, by a verification authority server, a secure token to the receiving computer, wherein the providing comprises:
1) creating a secure token;
2) registering the secure token in a token registry database; and
3) encrypting the registered secure token with the receiving computer public key;
4) issuing the encrypted registered secure token to the receiving computer;
d. updating and sending the secure token from the receiving computer to the initiating computer, wherein the updating and sending comprises:
1) decrypting the encrypted registered secure token using the receiving computer private key;
2) updating the registered secure token with approval information acknowledging that the receiving computer wishes to proceed with an exchange;
3) receiving initiating computer public key from the registry server;
4) encrypting the updated registered secure token with the initiating computer public key; and
5) forwarding the encrypted updated registered token to the initiating computer for verification,
e. verifying and sending the updated secure token from the initiating computer, wherein the verifying and sending comprises:
1) decrypting the encrypted updated registered secure token with the initiating computer private key;
2) reading the decrypted secure token to confirm the unique receiving computer identifying information to verify that receiving computer is the same party that previously sent the electronic request;
3) encrypting, with the initiating computer, the secure token; and
4) forwarding the encrypted secure token for verification;
f. verifying, by the verification authority server, that the token is valid, wherein the verifying comprises:
1) decrypting the forwarded secure token;
2) checking token ID information of the secure token against the token registry to link the electronic request to the receiving computer; and
3) when the token ID information matches the token registry, retiring the token and sending an encrypted message to the initiating computer indicating token acceptance and approval of the transaction.