SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION

ABSTRACT

Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating identifiers with individuals having previously verified personal identities, assigning verification addresses on a block chain to the individuals, and recording identifiers and biometric data associated with the individuals at corresponding verification addresses. Block chain-based multifactor personal identity verification using the verification addresses may be performed by: receiving one or more identifiers in connection with one or more requests to verify an identity of one or more individuals, extracting the biometric data associated with the one or more individuals from the corresponding verification addresses, and verifying the identity of the one or more individuals upon receiving matching biometric data and private keys.

FIELD OF THE DISCLOSURE

This disclosure relates to systems and methods for providing blockchain-based multifactor personal identity verification.

SUMMARY

One aspect of the disclosure relates to a system for providing blockchain-based multifactor personal identity verification. The system mayinclude one or more hardware processors configured by machine-readableinstructions to establish verification addresses on a block chain and/orperform block chain-based multifactor personal identity verificationusing the verification addresses. Establishing verification addresses onthe block chain may include associating identifiers with individualshaving previously verified personal identities, a first identifier beingassociated a first individual, the first individual having a previouslyverified personal identity; assigning verification addresses on a blockchain to the individuals, a given verification address including apublic key and a private key, a first verification address beingassigned to the first individual, the first verification addressincluding a first public key and a first private key; and recordingidentifiers and biometric data associated with the individuals atcorresponding verification addresses, the first identifier and firstbiometric data associated with the first individual being recorded atthe first verification address. Performing block chain-based multifactorpersonal identity verification using the verification addresses mayinclude receiving one or more identifiers in connection with one or morerequests to verify an identity of one or more individuals, the firstidentifier being received in connection with a request to verify anidentity of the first individual; extracting the biometric dataassociated with the one or more individuals from the correspondingverification addresses, the first biometric data associated with thefirst individual being extracted from the first verification address;and verifying the identity of the one or more individuals upon receivingmatching biometric data and private keys, the personal identity of thefirst individual being verified upon receipt of (1) biometric datamatching the first biometric data and (2) a private key matching thefirst private key.

Another aspect of the disclosure relates to a method for establishingverification addresses on a block chain in order to provide blockchain-based multifactor personal identity verification. The method maybe performed by one or more hardware processors configured bymachine-readable instructions. The method may include associatingidentifiers with individuals having previously verified personalidentities, a first identifier being associated a first individual, thefirst individual having a previously verified personal identity;assigning verification addresses on a block chain to the individuals, agiven verification address including a public key and a private key, afirst verification address being assigned to the first individual, thefirst verification address including a first public key and a firstprivate key; and recording identifiers and biometric data associatedwith the individuals at corresponding verification addresses, the firstidentifier and first biometric data associated with the first individualbeing recorded at the first verification address. The identity of theone or more individuals may be verifiable upon receiving matchingbiometric data and private keys, such that the personal identity of thefirst individual is verifiable upon receipt of (1) biometric datamatching the first biometric data and (2) a private key matching thefirst private key.

Yet another aspect of the disclosure relates to a method for performblock chain-based multifactor personal identity verification usingverification addresses. The method may be performed by one or morehardware processors configured by machine-readable instructions. Themethod may include receiving one or more identifiers in connection withone or more requests to verify an identity of one or more individuals, afirst identifier being received in connection with a request to verifyan identity of a first individual; extracting biometric data associatedwith the one or more individuals from corresponding verificationaddresses on a block chain, a given verification address including apublic key and a private key, first biometric data associated with thefirst individual being extracted from a first verification addressassigned to the first individual, the first verification addressincluding a first public key and a first private key; and verifying theidentity of the one or more individuals upon receiving matchingbiometric data and private keys, the personal identity of the firstindividual being verified upon receipt of (1) biometric data matchingthe first biometric data and (2) a private key matching the firstprivate key.

These and other features, and characteristics of the present technology,as well as the methods of operation and functions of the relatedelements of structure and the combination of parts and economies ofmanufacture, will become more apparent upon consideration of thefollowing description and the appended claims with reference to theaccompanying drawings, all of which form a part of this specification,wherein like reference numerals designate corresponding parts in thevarious figures. It is to be expressly understood, however, that thedrawings are for the purpose of illustration and description only andare not intended as a definition of the limits of the invention. As usedin the specification and in the claims, the singular form of “a”, “an”,and “the” include plural referents unless the context clearly dictatesotherwise.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a system for providing block chain-based multifactorpersonal identity verification, in accordance with one or moreimplementations.

FIG. 2 illustrates a method for establishing verification addresses on ablock chain in order to provide block chain-based multifactor personalidentity verification, in accordance with one or more implementations.

FIG. 3 illustrates a method for performing block chain-based multifactorpersonal identity verification using verification addresses, inaccordance with one or more implementations.

DETAILED DESCRIPTION

FIG. 1 illustrates a system 100 for providing block chain-basedmultifactor personal identity verification, in accordance with one ormore implementations. In some implementations, system 100 may includeone or more servers 102. The server(s) 102 may be configured tocommunicate with one or more computing platforms 104 according to aclient/server architecture, a peer-to-peer architecture, and/or otherarchitectures. The users may access system 100 via computing platform(s)104.

The server(s) 102 may be configured to execute machine-readableinstructions 106. The machine-readable instructions 106 may include oneor more of an individual identifier component 108, a verificationaddress assignment component 110, an address recordation component 112,a user interface component 114, a verification request component 116, aninformation extraction component 118, an identity verification component120, and/or other machine-readable instruction components.

The machine-readable instructions 106 may be executable to establishverification addresses on a block chain. Generally speaking, a blockchain is a transaction database shared by some or all nodesparticipating in system 100. Such participation may be based on theBitcoin protocol, Ethereum protocol, and/or other protocols related todigital currencies and/or block chains. A full copy of the block chaincontains every transaction ever executed in an associated digitalcurrency. In addition to transactions, other information may becontained by the block chain, such as described further herein.

The block chain may be based on several blocks. A block may include arecord that contains and confirms one or more waiting transactions.Periodically (e.g., roughly every one minute), a new block includingtransactions and/or other information may be appended to the blockchain. In some implementations, a given block in the block chaincontains a hash of the previous block. This may have the effect ofcreating a chain of blocks from a genesis block (i.e., the first blockin the block chain) to a current block. The given block may beguaranteed to come chronologically after a previous block because theprevious block's hash would otherwise not be known. The given block maybe computationally impractical to modify once it is included in theblock chain because every block after it would also have to beregenerated.

A given verification address may include a specific location on theblock chain where certain information is stored. In someimplementations, an individual verification address may be referred toas an “AtenVerify Address.” Verification addresses are further describedbelow in connection with verification address assignment component 110.

The individual identifier component 108 may be configured to associatedidentifiers with individuals having previously verified personalidentities. For example, a first identifier may be associated a firstindividual. The first individual may have a previously verified personalidentity. Generally speaking, an identifier may include one or more of anumber, an alphanumeric code, a username, and/or other information thatcan be linked to an individual. In some implementations, an individualidentifier may be referred to as an “Aten ID.”

In accordance with some implementations, an individual having apreviously verified personal identity may have obtained the previouslyverified personal identity through a variety of approaches. For example,in some implementations the individual may be required to provideevidence of the individual's identity. Such evidence may include one ormore of providing a copy of a government issued identification (e.g.,passport and/or driver's license), providing a copy of mail received bythe individual (e.g., a utility bill), evidence provided by a thirdparty, and/or other evidence on an individual's identity. The evidencemay be provided to an entity associated with server(s) 102.

The verification address assignment component 110 may be configured toassign verification addresses on a block chain to the individuals. Agiven verification address may include a public key and a private key.By way of example, a first verification address may be assigned to thefirst individual. The first verification address may include a firstpublic key and a first private key.

Generally speaking, a public and private key-pair may be used forencryption and decryption according to one or more public keyalgorithms. By way of non-limiting example, a key pair may be used fordigital signatures. Such a key pair may include a private key forsigning and a public key for verification. The public key may be widelydistributed, while the private key is kept secret (e.g., known only toits proprietor). The keys may be related mathematically, but calculatingthe private key from the public key is unfeasible.

In some implementations, verification address assignment component 110may be configured such that private keys may be stored within computingplatform(s) 104. For example, the first private key may be stored withina computing platform 104 and/or other locations associated with thefirst individual. In accordance with some implementation, a private keymay be stored in one or more of a “verify.dat” file, a SIM card, and/orother locations.

In some implementations, verification address assignment component 110may be configured such that multiple verification addresses may beassigned to separate individuals. For example, in addition to the firstverification address, a second verification address may be assigned tothe first individual. One or more additional verification addresses maybe assigned to the first individual, in accordance with one or moreimplementations.

The address recordation component 112 may be configured to recordidentifiers and biometric data associated with the individuals atcorresponding verification addresses. For example, the first identifierand first biometric data associated with the first individual may berecorded at the first verification address. Recording information at agiven verification address may include recording a hash or otherencrypted representation of the information. In some implementations,different biometric data may be recorded at multiple verificationaddresses assigned to a single given individual. For example, inaddition to the first identifier and the first biometric data associatedwith the first individual being recorded at the first verificationaddress, the first identifier and second biometric data associated withthe first individual may be recorded at a second verification address.

Generally speaking, biometric data may include metrics related to humancharacteristics. Biometric identifiers are distinctive, measurablecharacteristics that can be used to label and describe individuals.Biometric identifiers are typically include physiologicalcharacteristics, but may also include behavioral characteristics and/orother characteristics. Physiological characteristics may be related tothe shape of an individual's body. Examples of physiologicalcharacteristics used as biometric data may include one or more offingerprint, palm veins, face recognition, DNA, palm print, handgeometry, iris recognition, retina, odor or scent, and/or otherphysiological characteristics. Behavioral characteristics may be relatedto a pattern of behavior of an individual. Examples of behavioralcharacteristics used as biometric data may include one or more of typingrhythm, gait, voice, and/or other behavioral characteristics.

The biometric data may include one or more of an image or other visualrepresentation of a physiological characteristic, a recording of abehavioral characteristic, a template of a physiological characteristicand/or behavioral characteristic, and/or other biometric data. Atemplate may include a synthesis of relevant features extracted from thesource. A template may include one or more of a vector describingfeatures of a physiological characteristic and/or behavioralcharacteristic, a numerical representation of a physiologicalcharacteristic and/or behavioral characteristic, an image withparticular properties, and/or other information.

Biometric data may be received via computing platforms 104 associatedwith the individuals. For example, biometric data associated with afirst individual may be received via a first computing platform 104associated with the first individual. The first computing platform 104may include an input device (not depicted) configured to capture and/orrecord a physiological characteristic and/or behavioral characteristicof the first individual. Examples of such an input device may includeone or more of a camera and/or other imaging device, a fingerprintscanner, a microphone, an accelerometer, and/or other input devices.

The user interface component 114 may be configured to provide aninterface for presentation to individuals via associated computingplatforms 104. The interface may include a graphical user interfacepresented via individual computing platforms 104. According to someimplementations, the interface may be configured to allow a givenindividual to add or delete verification addresses assigned to the givenindividual so long as at least one verification address is assigned tothe given individual.

In some implementations, user interface component 114 may be configuredto access and/or manage one or more user profiles and/or userinformation associated with users of system 100. The one or more userprofiles and/or user information may include information stored byserver(s) 102, one or more of the computing platform(s) 104, and/orother storage locations. The user profiles may include, for example,information identifying users (e.g., a username or handle, a number, anidentifier, and/or other identifying information), security logininformation (e.g., a login code or password), system accountinformation, subscription information, digital currency accountinformation (e.g., related to currency held in credit for a user),relationship information (e.g., information related to relationshipsbetween users in system 100), system usage information, demographicinformation associated with users, interaction history among users inthe system 100, information stated by users, purchase information ofusers, browsing history of users, a computing platform identificationassociated with a user, a phone number associated with a user, and/orother information related to users.

The machine-readable instructions 106 may be executable to perform blockchain-based multifactor personal identity verification using theverification addresses.

The verification request component 116 may be configured to receive oneor more identifiers in connection with one or more requests to verify anidentity of one or more individuals. For example, the first identifiermay be received in connection with a request to verify an identity ofthe first individual. Requests for identity verification may be providedin connection with and/or related to financial transactions, informationexchanges, and/or other interactions. Requests may be received fromother individuals and/or other third parties.

The information extraction component 118 may be configured to extractthe biometric data associated with the one or more individuals from thecorresponding verification addresses. For example, the first biometricdata associated with the first individual may be extracted from thefirst verification address. Extracting information (e.g., biometricdata) from a verification address may include decrypting information.

According to some implementations, information extraction component 118may be configured such that, responsive to receiving the request toverify the identity of the first individual, a prompt may be provided tothe first individual for biometric data matching the first biometricdata and a private key matching the first private key. The prompt may beconveyed via a computing platform 104 associated with the firstindividual. The prompt may be conveyed via a graphical user interfaceand/or other user interface provided by the computing platform 104associated with the first individual. The prompt may include anindication that is one or more of visual, audible, haptic, and/or otherindications.

In some implementations, information extraction component 118 may beconfigured such that, responsive to receiving the request to verify theidentity of the first individual, a prompt may be provided to acomputing platform 104 associated with the first individual. The promptmay cause the computing platform 104 to automatically provide, toserver(s) 102, biometric data matching the first biometric data and/or aprivate key matching the first private key.

The identity verification component 120 may be configured to verify theidentity of the one or more individuals upon, or in response to,receiving matching biometric data and private keys. For example, thepersonal identity of the first individual may be verified upon receiptof (1) biometric data matching the first biometric data and (2) aprivate key matching the first private key. Verifying the personalidentity of the first individual may include comparing storedinformation with newly received information.

According to some implementations, identity verification component 120may be configured such that the personal identity of the firstindividual may be verified upon receipt of (1) biometric data matchingthe first biometric data or the second biometric data and (2) a privatekey matching the first private key. Such implementations may provideso-called “M-of-N” signatures for identity verification where somesubset of a larger set of identifying information is required.

In some implementations, identity verification component 120 may beconfigured such that the biometric data matching the first biometricdata and the private key matching the first private key may be used tosign the verification of the personal identity of the first individual.

A cryptographic signature is a mathematical mechanism that allowssomeone to prove ownership. In the case of Bitcoin, a Bitcoin wallet andits private key(s) are linked by some mathematical magic. When yourBitcoin software signs a transaction with the appropriate private key,the whole network can see that the signature matches the bitcoins beingspent. However, there is no way for the world to guess your private keyto steal your hard-earned bitcoins.

In some implementations, at least one dedicated node performs thesigning of the verification of the personal identity of the firstindividual. A given dedicated node may include one or more of theserver(s) 102. The given dedicated node may be a public node or aprivate node configured for creating new blocks and/or for signingverification.

In some implementations, server(s) 102, computing platform(s) 104,and/or external resources 122 may be operatively linked via one or moreelectronic communication links. For example, such electroniccommunication links may be established, at least in part, via a networksuch as the Internet and/or other networks. It will be appreciated thatthis is not intended to be limiting, and that the scope of thisdisclosure includes implementations in which server(s) 102, computingplatform(s) 104, and/or external resources 122 may be operatively linkedvia some other communication media.

A given computing platform 104 may include one or more processorsconfigured to execute machine-readable instructions. Themachine-readable instructions may be configured to enable an expert oruser associated with the given computing platform 104 to interface withsystem 100 and/or external resources 122, and/or provide otherfunctionality attributed herein to computing platform(s) 104. By way ofnon-limiting example, the given computing platform 104 may include oneor more of adesktop computer, a laptop computer, a handheld computer, atablet computing platform, a NetBook, a Smartphone, a gaming console,and/or other computing platforms.

External resources 122 may include sources of information, hosts and/orproviders of virtual environments outside of system 100, externalentities participating with system 100, and/or other resources. In someimplementations, some or all of the functionality attributed herein toexternal resources 100 may be provided by resources included in system100.

Server(s) 102 may include electronic storage 124, one or more processors126, and/or other components. Server(s) 102 may include communicationlines, or ports to enable the exchange of information with a networkand/or other computing platforms. Illustration of server(s) 102 in FIG.1 is not intended to be limiting. Server(s) 102 may include a pluralityof hardware, software, and/or firmware components operating together toprovide the functionality attributed herein to server(s) 102. Forexample, server(s) 102 may be implemented by a cloud of computingplatforms operating together as server(s) 102.

Electronic storage 124 may comprise non-transitory storage media thatelectronically stores information. The electronic storage media ofelectronic storage 124 may include one or both of system storage that isprovided integrally (i.e., substantially non-removable) with server(s)102 and/or removable storage that is removably connectable to server(s)102 via, for example, a port (e.g., a USB port, a firewire port, etc.)or a drive (e.g., a disk drive, etc.). Electronic storage 124 mayinclude one or more of optically readable storage media (e.g., opticaldisks, etc.), magnetically readable storage media (e.g., magnetic tape,magnetic hard drive, floppy drive, etc.), electrical charge-basedstorage media (e.g., EEPROM, RAM, etc.), solid-state storage media(e.g., flash drive, etc.), and/or other electronically readable storagemedia. Electronic storage 124 may include one or more virtual storageresources (e.g., cloud storage, a virtual private network, and/or othervirtual storage resources). Electronic storage 124 may store softwarealgorithms, information determined by processor(s) 126, informationreceived from server(s) 102, information received from computingplatform(s) 104, and/or other information that enables server(s) 102 tofunction as described herein.

Processor(s) 126 may be configured to provide information processingcapabilities in server(s) 102. As such, processor(s) 126 may include oneor more of a digital processor, an analog processor, a digital circuitdesigned to process information, an analog circuit designed to processinformation, a state machine, and/or other mechanisms for electronicallyprocessing information. Although processor(s) 126 is shown in FIG. 1 asa single entity, this is for illustrative purposes only. In someimplementations, processor(s) 126 may include a plurality of processingunits. These processing units may be physically located within the samedevice, or processor(s) 126 may represent processing functionality of aplurality of devices operating in coordination. The processor(s) 126 maybe configured to execute machine-readable instruction components 108,110, 112, 114, 116, 118, 120, and/or other machine-readable instructioncomponents. Processor(s) 126 may be configured to executemachine-readable instruction components 108, 110, 112, 114, 116, 118,120, and/or other machine-readable instruction components by software;hardware; firmware; some combination of software, hardware, and/orfirmware; and/or other mechanisms for configuring processingcapabilities on processor(s) 126. As used herein, the term“machine-readable instruction component” may refer to any component orset of components that perform the functionality attributed to themachine-readable instruction component. This may include one or morephysical processors during execution of processor readable instructions,the processor readable instructions, circuitry, hardware, storage media,or any other components.

It should be appreciated that although machine-readable instructioncomponents 108, 110, 112, 114, 116, 118, and 120 are illustrated in FIG.1 as being implemented within a single processing unit, inimplementations in which processor(s) 126 includes multiple processingunits, one or more of machine-readable instruction components 108, 110,112, 114, 116, 118, and/or 120 may be implemented remotely from theother machine-readable instruction components. The description of thefunctionality provided by the different machine-readable instructioncomponents 108, 110, 112, 114, 116, 118, and/or 120 described below isfor illustrative purposes, and is not intended to be limiting, as any ofmachine-readable instruction components 108, 110, 112, 114, 116, 118,and/or 120 may provide more or less functionality than is described. Forexample, one or more of machine-readable instruction components 108,110, 112, 114, 116, 118, and/or 120 may be eliminated, and some or allof its functionality may be provided by other ones of machine-readableinstruction components 108, 110, 112, 114, 116, 118, and/or 120. Asanother example, processor(s) 126 may be configured to execute one ormore additional machine-readable instruction components that may performsome or all of the functionality attributed below to one ofmachine-readable instruction components 108, 110, 112, 114, 116, 118,and/or 120.

FIG. 2 illustrates a method 200 for establishing verification addresseson a block chain in order to provide block chain-based multifactorpersonal identity verification, in accordance with one or moreimplementations. The operations of method 200 presented below areintended to be illustrative. In some implementations, method 200 may beaccomplished with one or more additional operations not described,and/or without one or more of the operations discussed. Additionally,the order in which the operations of method 200 are illustrated in FIG.2 and described below is not intended to be limiting.

In some implementations, one or more operations of method 200 may beimplemented in one or more processing devices (e.g., a digitalprocessor, an analog processor, a digital circuit designed to processinformation, an analog circuit designed to process information, a statemachine, and/or other mechanisms for electronically processinginformation). The one or more processing devices may include one or moredevices executing some or all of the operations of method 200 inresponse to instructions stored electronically on an electronic storagemedium. The one or more processing devices may include one or moredevices configured through hardware, firmware, and/or software to bespecifically designed for execution of one or more of the operations ofmethod 200.

At an operation 202, identifiers may be associated with individualshaving previously verified personal identities. A first identifier maybe associated a first individual. The first individual may have apreviously verified personal identity. Operation 202 may be performed byone or more hardware processors configured to execute a machine-readableinstruction component that is the same as or similar to individualidentifier component 108 (as described in connection with FIG. 1), inaccordance with one or more implementations.

At an operation 204, verification addresses on a block chain may beassigned to the individuals. A given verification address may include apublic key and a private key. A first verification address may beassigned to the first individual. The first verification address mayinclude a first public key and a first private key. Operation 204 may beperformed by one or more hardware processors configured to execute amachine-readable instruction component that is the same as or similar toverification address assignment component 110 (as described inconnection with FIG. 1), in accordance with one or more implementations.

At an operation 206, identifiers and biometric data associated with theindividuals may be recorded at corresponding verification addresses. Thefirst identifier and first biometric data associated with the firstindividual may be recorded at the first verification address. Theidentity of the one or more individuals may be verifiable upon, or inresponse to, receiving matching biometric data and private keys. Thepersonal identity of the first individual may be verifiable upon, or inresponse to, receipt of (1) biometric data matching the first biometricdata and (2) a private key matching the first private key. Operation 206may be performed by one or more hardware processors configured toexecute a machine-readable instruction component that is the same as orsimilar to address recordation component 112 (as described in connectionwith FIG. 1), in accordance with one or more implementations.

FIG. 3 illustrates a method 300 for performing block chain-basedmultifactor personal identity verification using verification addresses,in accordance with one or more implementations. The operations of method300 presented below are intended to be illustrative. In someimplementations, method 300 may be accomplished with one or moreadditional operations not described, and/or without one or more of theoperations discussed. Additionally, the order in which the operations ofmethod 300 are illustrated in FIG. 3 and described below is not intendedto be limiting.

In some implementations, method 300 may be implemented in one or moreprocessing devices (e.g., a digital processor, an analog processor, adigital circuit designed to process information, an analog circuitdesigned to process information, a state machine, and/or othermechanisms for electronically processing information). The one or moreprocessing devices may include one or more devices executing some or allof the operations of method 300 in response to instructions storedelectronically on an electronic storage medium. The one or moreprocessing devices may include one or more devices configured throughhardware, firmware, and/or software to be specifically designed forexecution of one or more of the operations of method 300.

At an operation 302, one or more identifiers may be received inconnection with one or more requests to verify an identity of one ormore individuals. A first identifier may be received in connection witha request to verify an identity of a first individual. Operation 302 maybe performed by one or more hardware processors configured to execute amachine-readable instruction component that is the same as or similar toverification request component 116 (as described in connection with FIG.1), in accordance with one or more implementations.

At an operation 304, biometric data associated with the one or moreindividuals may be extracted from corresponding verification addresseson a block chain. A given verification address may include a public keyand a private key. First biometric data associated with the firstindividual may extracted from a first verification address assigned tothe first individual. The first verification address may include a firstpublic key and a first private key. Operation 304 may be performed byone or more hardware processors configured to execute a machine-readableinstruction component that is the same as or similar to informationextraction component 118 (as described in connection with FIG. 1), inaccordance with one or more implementations.

At an operation 306, the identity of the one or more individuals may beverified upon, or in response to, receiving matching biometric data andprivate keys. The personal identity of the first individual may beverified upon, or in response to, receipt of (1) biometric data matchingthe first biometric data and (2) a private key matching the firstprivate key. Operation 306 may be performed by one or more hardwareprocessors configured to execute a machine-readable instructioncomponent that is the same as or similar to identity verificationcomponent 120 (as described in connection with FIG. 1), in accordancewith one or more implementations.

Exemplary implementations may facilitate storing personal data on theblock chain. The personal data may be stored on the block chain in anencrypted way. A person may be identified at the block chain level withone or more of a private key, a finger print, a finger print hash, aneye retina, an eye retina hash, and/or other unique information. Thedata stored may include or relate to one or more of a passport, anidentification card, extracted passport information, a driver's license,extracted driver's license information, finger print, eye retina, and/orother information. According to some implementations, if some of thedata is changed, a new record may be created for that person in theblock chain. That is, all changes are added as new records. The oldrecord will always be stored on the block chain. Generally speaking, allrecords on the block chain are stored forever and cannot be removed.More than one copy of the block chain will exist to ensure the recordsare not manipulated.

Exemplary implementations may facilitate access to personal data. Theremay be multiple access levels for the personal data in the block chain.Access controls may be grated on public/private key pairs levels.Examples of access levels may include one or more of Super Admin (fullaccess to block chain), Authorities-country level (full read-onlyaccess), Authorities-state/local level (limited read-only access),Police and other services including Emergency (access to certainpersonal data by Finger Print/Eye retina of that person only),Participating Merchants (limited access), and/or other access levels.

Exemplary implementations may facilitate verification check. There maybe multiple levels for how it is possible to check verification. Forexample, some implementations may ensure a person has a record at“Company” but no personal data is provided. Some implementations mayensure a person has a record at Company and get very basic personalinformation such as Full Name, DOB, Gender, and/or other basicinformation. Some implementations may ensure a person has a record atCompany and get all personal data.

Although the present technology has been described in detail for thepurpose of illustration based on what is currently considered to be themost practical and preferred implementations, it is to be understoodthat such detail is solely for that purpose and that the technology isnot limited to the disclosed implementations, but, on the contrary, isintended to cover modifications and equivalent arrangements that arewithin the spirit and scope of the appended claims. For example, it isto be understood that the present technology contemplates that, to theextent possible, one or more features of any implementation can becombined with one or more features of any other implementation.

1-20. (canceled)
 21. A system for providing blockchain-based personalidentity verification, the system comprising: one or morecomputer-readable storage media configured to store a blockchain; acomputer system comprising one or more processors programmed to executecomputer program instructions that, when executed, cause the computersystem to: assign a verification address associated with the blockchainto an individual, the individual having a previously verified personalidentity, wherein the verification address is a specific location on theblockchain where information is stored, and wherein the verificationaddress is derived from a public key contained in a public and privatekey-pair; store, at the one or more computer-readable storage media, anidentifier of the individual and biometric information of the individualin association with the verification address associated with theblockchain, at least the biometric information being stored at thespecific location on the blockchain, wherein the biometric informationis derived from biometric data of the individual; obtain, from aclient-side device, a received identifier and one or more of receivedbiometric data and received biometric information in connection with arequest to verify the individual's identity, the request indicating theverification address associated with the blockchain; obtain the storedidentifier and the stored biometric information using the verificationaddress indicated in the request, wherein at least the stored biometricinformation is obtained from the specific address on the blockchain; andsign verification of the individual's identity responsive to adetermination that the received identifier matches the storedidentifier, and one or more of: (i) derived biometric informationderived from the received biometric data matches the stored biometricinformation, and (ii) the received biometric information matches thestored biometric information, assign a second verification addressassociated with the blockchain to the individual, wherein the secondverification address is a second specific location on the blockchainwhere information is stored; store, at the one or more computer-readablestorage media, second biometric information of the individual inassociation with the second verification address associated with theblockchain, the second biometric information derived from secondbiometric data of the individual, the second biometric information beingstored at the second specific location on the blockchain; obtain, fromthe client-side device, one or more of second received biometric dataand second received biometric information in connection with the requestto verify the individual's identity, the request further indicating thesecond verification address associated with the blockchain; obtain thesecond stored biometric information using the second verificationaddress indicated in the request; and sign the verification of theindividual's identity responsive to a determination that the identifierof the request matches the stored identifier and one or more of: (i)derived biometric information derived from the received biometric datamatches the stored biometric information and second derived biometricinformation derived from the second received biometric data matches thesecond stored biometric information, and (ii) the received biometricinformation matches the stored biometric information and the secondreceived biometric information matches the second stored biometricinformation; wherein the second biometric information is different fromthe biometric information and wherein the second specific location onthe blockchain is different from the specific location on theblockchain.
 22. The system of claim 21, wherein the server-side computersystem is caused to: obtain, via a user interface, a user-initiatedcommand to add the second verification address as an address of theblockchain for the individual; and assign the second verificationaddress associated with the blockchain to the individual based on theuser-initiated command.
 23. The system of claim 21, wherein the computersystem is caused to: obtain, via a user interface, a user-initiatedcommand to remove the second verification address as an address of theblockchain for the individual; and de-associate the second verificationaddress associated with the blockchain from the individual based on theuser-initiated command.
 24. The system of claim 21, wherein the computersystem is caused to: in the step of storing, store the identifier at thespecific location on the blockchain corresponding to the verificationaddress; in the step of obtaining the stored identifier and the storedbiometric information using the verification address indicated in therequest, obtain the identifier from the blockchain at the verificationaddress; in the step of storing, store the second identifier at thesecond specific location on the blockchain corresponding to the secondverification address; in the step of obtaining the stored secondidentifier and the stored second biometric information using the secondverification address indicated in the request, obtain the secondidentifier from the blockchain at the second verification address. 25.The system of claim 21, wherein the computer system is caused to: in thestep of storing, store at least the biometric information as a newtransaction record on the blockchain at the specific location on theblockchain; and in the step of storing, store at least the secondbiometric information as another new transaction record on theblockchain at the second specific location on the blockchain.
 26. Thesystem of claim 25, wherein the computer system is caused to: in thestep of storing, store the new transaction record linked to a previoustransaction record by a hash of the previous transaction record.
 27. Thesystem of claim 21, wherein the signing step utilizes the private key ofthe public and private key-pair from which the verification address wasderived, and the second private key of the second public and secondprivate key-pair from which the second verification address was derived.28. The system of claim 21, wherein the biometric data is related to afingerprint, palm veins, face recognition, DNA, palm print, handgeometry, iris recognition, retina, odor, gait, or voice, wherein thebiometric information and the identifier are different from each other.29. The system of claim 21, wherein the computer system is caused to:prior to the step of storing, use the processor or processors toinitially verify the individual's identity by use of government issuedidentification of the individual.
 30. A system for providingblockchain-based personal identity verification, the system comprisingone or more computer-readable storage media configured to store ablockchain and a first computing device comprising one or moreprocessors programmed to execute computer program instructions that,when executed, cause the first computing device to: assign averification address to an individual, wherein the verification addresscorresponds to a location in the blockchain; store identificationinformation in the blockchain at the location corresponding to theverification address, wherein the identification information uniquelyidentifies an individual; in response to a request received from asecond computing device, retrieve information from a location in theblockchain corresponding to an address derived from the request; andcompare the information retrieved from the location in the blockchaincorresponding to the address derived from the request with informationobtained from the second computing device, and if a match is found,issue a verification that a person associated with the informationobtained from the second computing device is the individual.
 31. Thesystem of claim 30, wherein the verification address is derivable from apublic key associated with the individual.
 32. The system of claim 30,wherein the identification information comprises biometric informationof the individual.
 33. The system of claim 30, wherein theidentification information comprises information derived from theindividual's passport.
 34. The system of claim 30, wherein theidentification information comprises information derived from theindividual's driver's license.
 35. The system of claim 30, wherein thecomputer system is caused to: in the step of storing, store theidentification information as a new transaction record on the blockchainat the location on the blockchain corresponding to the verificationaddress.
 36. The system of claim 35, wherein the computer system iscaused to: in the step of storing, store the new transaction recordlinked to a previous transaction record by a hash of the previoustransaction record.
 37. The system of claim 30, wherein the computersystem is caused to: in issuing the verification, utilize the privatekey of a public and private key-pair from which the verification addresswas derived to issue the verification.
 38. The system of claim 30,wherein the computer system is caused to: prior to the step of storing,use the processor or processors to initially verify the individual'sidentity by use of government issued identification of the individual.39. A system for providing blockchain-based personal identityverification, the system comprising: one or more computer-readablestorage media configured to store a blockchain; and a computer systemcomprising one or more processors programmed to execute computer programinstructions that, when executed, cause the computer system to: assignmultiple verification addresses of the blockchain to the individual, theindividual having a previously verified personal identity, the multipleverification addresses comprising a first verification addressassociated with the blockchain and a second verification addressassociated with the blockchain, wherein the first verification addressprovides a first specific location on the blockchain and the secondverification address provides a second specific location on theblockchain; store, at the one or more computer-readable storage media:(i) a first identifier of the individual and first biometric informationof the individual in association with the first verification addressassociated with the blockchain at the first specific location on theblockchain and (ii) second identifier and second biometric informationof the individual in association with the second verification addressassociated with the blockchain at the second specific location on theblockchain, wherein the first biometric information is derived fromfirst biometric data of the individual, and the second biometricinformation is derived from second biometric data of the individual, andwherein the first verification address is different from the secondverification address, the first verification address is derived from thefirst public key of the first public and private key-pair, and thesecond verification address is derived from the second public key of thesecond public and private key-pair; obtain, from a client-side device, afirst received identifier, one or more of first received biometric dataand first received biometric information, a second identifier and one ormore of second received biometric data and second received biometricinformation in connection with a request to verify the individual'sidentity, the request indicating the first verification addressassociated with the blockchain and the second verification addressassociated with the blockchain; obtain: (i) the stored first identifierand the stored first biometric information from the blockchain using thefirst verification address indicated in the request, and (ii) the storedsecond identifier and the stored second biometric information from theblockchain using the second verification address indicated in therequest; and sign, using the private key from which the firstverification address was derived and using the private key from whichthe second verification address was derived, verification of theindividual's identity responsive to a determination that the firstreceived identifier matches the first stored identifier, the secondreceived identifier matches the second stored identifier, one or moreof: first derived biometric information derived from the first receivedbiometric data matches the first stored biometric information and secondderived biometric information derived from the second received biometricdata matches the second stored biometric information, and the firstreceived biometric information matches the first stored biometricinformation and the second received biometric information matches thesecond stored biometric information, provide a first user, differentthan the individual, access to data stored at the one or morecomputer-readable storage media in association with the firstverification address associated with the blockchain, the first userbeing provided access to the stored data based on verification that thefirst user has a first private key, the first private key beingdifferent the private key from which the first verification address wasderived and different from the private key from which the secondverification address was derived; and deny a second user, different thanthe individual, access to the stored data based on verification that thesecond user has a second private key.
 40. The system of claim 39,wherein the computer system is caused to: in the step of storing thefirst and second identifiers, store the identifier at the first andsecond specific locations on the blockchain corresponding to the firstand second verification addresses, respectively; and in the step ofobtaining the stored first identifier and the stored first biometricinformation, obtain the first stored identifier and the stored firstbiometric information using the first verification address indicated inthe request, and in the step of obtaining the stored second identifierand the stored second biometric information, obtain the stored secondidentifier and the stored second biometric information using the secondverification address indicated in the request.
 41. The system of claim39, wherein the computer system is caused to: in the step of storing, atthe one or more computer-readable storage media, store at least thefirst biometric information as a first new transaction record on theblockchain at the first specific location on the blockchain and store atleast the second biometric information as a second new transactionrecord on the blockchain at the second specific location.
 42. The systemof claim 39, wherein the computer system is caused to: in the step ofstoring, store the first identifier and the first biometric informationas a first new transaction record on the blockchain at the firstspecific location on the blockchain, and store the second identifier andthe second biometric information as a second new transaction record onthe blockchain at the second specific location on the blockchain. 43.The system of claim 41, wherein the computer system is caused to: in thestep of storing, store the first new transaction record linked to afirst previous transaction record by a hash of the previous transactionrecord and store the second new transaction record linked to a secondprevious transaction.
 44. The system of claim 42, wherein the computersystem is caused to: in the step of storing, store the first newtransaction record linked to a first previous transaction record by afirst hash of the first previous transaction record, and store thesecond new transaction record linked to a second previous transactionrecord by a second hash of the second previous transaction record. 45.The system of claim 39, wherein the computer system is caused to: in thestep of storing, store the first biometric information as a hash of thefirst biometric data, and store the second biometric information as ahash of the second biometric data.
 46. The system of claim 40, whereinthe stored first biometric information is a hash of the first biometricdata and the stored second biometric information is a hash of the secondbiometric data.
 47. The system of claim 39, wherein the identifier andthe first biometric information and the second biometric information areeach different from each other.
 48. The system of claim 39, wherein thecomputer system includes a server-side computer.
 49. A system forproviding blockchain-based personal identity verification, the systemcomprising one or more hardware processors configured bymachine-readable instructions to: establish verification addresses on ablockchain by: associating identifiers with individuals havingpreviously verified personal identities, a first identifier beingassociated with a first individual, the first individual having apreviously verified personal identity; assigning verification addresseson a blockchain to the individuals, a given verification addressincluding a public key and a private key, a first verification addressbeing assigned to the first individual, the first verification addressincluding a first public key and a first private key, wherein the firstverification address is a first specific location on the blockchainwhere information is stored; and recording identifiers and biometricinformation associated with the individuals at correspondingverification addresses, the first identifier and first biometricinformation associated with the first individual being recorded at thefirst verification address, at least the first biometric informationbeing stored at the first specific location on the blockchain; andperform blockchain-based personal identity verification using theverification addresses by: receiving one or more identifiers inconnection with one or more requests to verify an identity of one ormore individuals, the first identifier being received in connection witha request to verify an identity of the first individual; extracting thebiometric information associated with the one or more individuals fromthe corresponding verification addresses, the first biometricinformation associated with the first individual being extracted fromthe first verification address from the first specific location on theblockchain; obtaining, from a client-side device, identifiers and one ormore of biometric data and biometric information in connection with arequest to verify the identity of one or more individuals, the requestindicating the verification address or addresses associated with theblockchain; and verifying the identity of the one or more individualsupon receiving matching biometric data or biometric information andprivate keys, the personal identity of the first individual beingverified upon receipt of a received private key matching the firstprivate key and one or more of: (i) derived biometric informationderived from the received biometric data matching the first biometricinformation and (ii) received biometric information matching the firstbiometric information.
 50. The system of claim 49, wherein the step ofverifying the first individual's identity further requires the receivedidentifier matching the recorded first identifier, and wherein thecomputer system is caused to: in the step of storing the first andsecond identifiers, store the identifier at the first and secondspecific locations on the blockchain corresponding to the first andsecond verification addresses, respectively; and in the step ofobtaining the stored first identifier and the stored first biometricinformation, obtain the first stored identifier and the stored firstbiometric information using the first verification address indicated inthe request, and in the step of obtaining the stored second identifierand the stored second biometric information, obtain the stored secondidentifier and the stored second biometric information using the secondverification address indicated in the request.