US 11,853,457 B2
Selectively verifying personal data
Oliver Latka, Munich (DE); and Anja Wilbert, Munich (DE)
Assigned to SAP SE, Walldorf (DE)
Filed by SAP SE, Walldorf (DE)
Filed on Aug. 2, 2022, as Appl. No. 17/879,162.
Application 17/879,162 is a continuation of application No. 16/705,609, filed on Dec. 6, 2019, granted, now 11,443,062.
Prior Publication US 2022/0414260 A1, Dec. 29, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); G06F 16/27 (2019.01); G06F 21/60 (2013.01); H04L 9/06 (2006.01); H04L 9/32 (2006.01); G06F 16/23 (2019.01); G06K 7/14 (2006.01); G06K 19/06 (2006.01)
CPC G06F 21/6245 (2013.01) [G06F 16/2379 (2019.01); G06F 16/27 (2019.01); G06F 21/602 (2013.01); G06K 7/1417 (2013.01); G06K 19/06037 (2013.01); H04L 9/0643 (2013.01); H04L 9/3231 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A computer-implemented method for selectively verifying personal data, the method comprising:
receiving, by an identity application of a client device, personal data of a user;
computing, via a cryptographic hash function, one or more cryptographic hashes from elements of the personal data;
storing the cryptographic hashes, an internal identifier and a timestamp as an entry in a distributed database,
wherein the internal identifier is unique within the distributed database;
receiving a user request from the user;
selecting one or more of the elements of personal data for verification;
requesting verification of the selected elements of personal data, wherein the verification request further comprises:
reading, by the client device, a machine-readable representation of the verification request, wherein the machine-readable representation may include a quick response code;
independently creating a second hash of the selected one or more elements; and
comparing the second hash to the computed cryptographic hash;
determining an authorization indication in response to the verification request;
when the authorization indication indicates that the verification request has been allowed, and the selected elements of personal data are accessible, verifying the selected elements of personal data using cryptographic hashes from the entry in the distributed databases;
maintaining, by a distribution service, a list of approved providers for the user, wherein each provider on the list is authorized to maintain at least one element of the personal data;
receiving, by the distribution service and from the client device, a change to the personal data; and
sending an update corresponding to the change to each provider on the list of approved providers.