SYSTEMS AND METHODS FOR PROVIDING BLOCK CHAIN-BASED MULTlFACTOR PERSONAL IDENTITY VERIFICATION

ABSTRACT

Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating identifiers with individuals having previously verified personal identities, assigning verification addresses on a block chain to the individuals, and recording identifiers and biometric data associated with the individuals at corresponding verification addresses. Block chain-based multifactor personal identity verification using the verification addresses may be performed by: receiving one or more identifiers in connection with one or more requests to verify an identity of one or more individuals, extracting the biometric data associated with the one or more individuals from the corresponding verification addresses, and verifying the identity of the one or more individuals upon receiving matching biometric data and private keys.

FIELD OF THE DISCLOSURE

This disclosure relates to systems and methods for providing blockchain-based multifactor personal identity verification.

SUMMARY

One aspect of the disclosure relates to a system for providing blockchain-based multifactor personal identity verification. The system mayinclude one or more hardware processors configured by machine-readableinstructions to establish verification addresses on a block chain and/orperform block chain-based multifactor personal identity verificationusing the verification addresses. Establishing verification addresses onthe block chain may include associating identifiers with individualshaving previously verified personal identities, a first identifier beingassociated a first individual, the first individual having a previouslyverified personal identity; assigning verification addresses on a blockchain to the individuals, a given verification address including apublic key and a private key, a first verification address beingassigned to the first individual, the first verification addressincluding a first public key and a first private key; and recordingidentifiers and biometric data associated with the individuals atcorresponding verification addresses, the first identifier and firstbiometric data associated with the first individual being recorded atthe first verification address. Performing block chain-based multifactorpersonal identity verification using the verification addresses mayinclude receiving one or more identifiers in connection with one or morerequests to verify an identity of one or more individuals, the firstidentifier being received in connection with a request to verify anidentity of the first individual; extracting the biometric dataassociated with the one or more individuals from the correspondingverification addresses, the first biometric data associated with thefirst individual being extracted from the first verification address;and verifying the identity of the one or more individuals upon receivingmatching biometric data and private keys, the personal identity of thefirst individual being verified upon receipt of (1) biometric datamatching the first biometric data and (2) a private key matching thefirst private key.

Another aspect of the disclosure relates to a method for establishingverification addresses on a block chain in order to provide blockchain-based multifactor personal identity verification. The method maybe performed by one or more hardware processors configured bymachine-readable instructions. The method may include associatingidentifiers with individuals having previously verified personalidentities, a first identifier being associated a first individual, thefirst individual having a previously verified personal identity;assigning verification addresses on a block chain to the individuals, agiven verification address including a public key and a private key, afirst verification address being assigned to the first individual, thefirst verification address including a first public key and a firstprivate key; and recording identifiers and biometric data associatedwith the individuals at corresponding verification addresses, the firstidentifier and first biometric data associated with the first individualbeing recorded at the first verification address. The identity of theone or more individuals may be verifiable upon receiving matchingbiometric data and private keys, such that the personal identity of thefirst individual is verifiable upon receipt of (1) biometric datamatching the first biometric data and (2) a private key matching thefirst private key.

Yet another aspect of the disclosure relates to a method for performblock chain based multifactor personal identity verification usingverification addresses. The method may be performed by one or morehardware processors configured by machine-readable instructions. Themethod may include receiving one or more identifiers in connection withone or more requests to verify an identity of one or more individuals, afirst identifier being received in connection with a request to verifyan identity of a first individual; extracting biometric data associatedwith the one or more individuals from corresponding verificationaddresses on a block chain, a given verification address including apublic key and a private key, first biometric data associated with thefirst individual being extracted from a first verification addressassigned to the first individual, the first verification addressincluding a first public key and a first private key; and verifying theidentity of the one or more individuals upon receiving matchingbiometric data and private keys, the personal identity of the firstindividual being verified upon receipt of (1) biometric data matchingthe first biometric data and (2) a private key matching the firstprivate key.

These and other features, and characteristics of the present technology,as well as the methods of operation and functions of the relatedelements of structure and the combination of parts and economies ofmanufacture, will become more apparent upon consideration of thefollowing description and the appended claims with reference to theaccompanying drawings, all of which form a part of this specification,wherein like reference numerals designate corresponding parts in thevarious figures. It is to be expressly understood, however, that thedrawings are for the purpose of illustration and description only andare not intended as a definition of the limits of the invention. As usedin the specification and in the claims, the singular form of “a”, “an”,and “the” include plural referents unless the context clearly dictatesotherwise.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a system for providing block chain-based multifactorpersonal identity verification, in accordance with one or moreimplementations.

FIG. 2 illustrates a method for establishing verification addresses on ablock chain in order to provide block chain-based multifactor personalidentity verification, in accordance with one or more implementations.

FIG. 3 illustrates a method for performing block chain-based multifactorpersonal identity verification using verification addresses, inaccordance with one or more implementations.

DETAILED DESCRIPTION

FIG. 1 illustrates a system 100 for providing block chain-basedmultifactor personal identity verification, in accordance with one ormore implementations. In some implementations, system 100 may includeone or more servers 102. The server(s) 102 may be configured tocommunicate with one or more computing platforms 104 according to aclient/server architecture, a peer-to-peer architecture, and/or otherarchitectures. The users may access system 100 via computing platform(s)104.

The server(s) 102 may be configured to execute machine-readableinstructions 106. The machine-readable instructions 106 may include oneor more of an individual identifier component 108, a verificationaddress assignment component 110, an address recordation component 112,a user interface component 114, a verification request component 116, aninformation extraction component 118, an identity verification component120, and/or other machine-readable instruction components.

The machine-readable instructions 106 may be executable to establishverification addresses on a block chain. Generally speaking, a blockchain is a transaction database shared by some or all nodesparticipating in system 100. Such participation may be based on theBitcoin protocol, Ethereum protocol, and/or other protocols related todigital currencies and/or block chains. A full copy of the block chaincontains every transaction ever executed in an associated digitalcurrency. In addition to transactions, other information may becontained by the block chain, such as described further herein.

The block chain may be based on several blocks. A block may include arecord that contains and confirms one or more waiting transactions.Periodically (e.g., roughly every one minute), a new block includingtransactions and/or other information may be appended to the blockchain. In some implementations, a given block in the block chaincontains a hash of the previous block. This may have the effect ofcreating a chain of blocks from a genesis block (i.e., the first blockin the block chain) to a current block. The given block may beguaranteed to come chronologically after a previous block because theprevious block's hash would otherwise not be known. The given block maybe computationally impractical to modify once it is included in theblock chain because every block after it would also have to beregenerated.

A given verification address may include a specific location on theblock chain where certain information is stored. In someimplementations, an individual verification address may be referred toas an “AtenVerify Address.” Verification addresses are further describedbelow in connection with verification address assignment component 110.

The individual identifier component 108 may be configured to associatedidentifiers with individuals having previously verified personalidentities. For example, a first identifier may be associated a firstindividual. The first individual may have a previously verified personalidentity. Generally speaking, an identifier may include one or more of anumber, an alphanumeric code, a username, and/or other information thatcan be linked to an individual. In some implementations, an individualidentifier may be referred to as an “Aten ID.”

In accordance with some implementations, an individual having apreviously verified personal identity may have obtained the previouslyverified personal identity through a variety of approaches. For example,in some implementations the individual may be required to provideevidence of the individual's identity. Such evidence may include one ormore of providing a copy of a government issued identification (e.g.,passport and/or driver's license), providing a copy of mail received bythe individual (e.g., a utility bill), evidence provided by a thirdparty, and/or other evidence on an individual's identity. The evidencemay be provided to an entity associated with server(s) 102.

The verification address assignment component 110 may be configured toassign verification addresses on a block chain to the individuals. Agiven verification address may include a public key and a private key.By way of example, a first verification address may be assigned to thefirst individual. The first verification address may include a firstpublic key and a first private key.

Generally speaking, a public and private key-pair may be used forencryption and decryption according to one or more public keyalgorithms. By way of non-limiting example, a key pair may be used fordigital signatures. Such a key pair may include a private key forsigning and a public key for verification. The public key may be widelydistributed, while the private key is kept secret (e.g., known only toits proprietor). The keys may be related mathematically, but calculatingthe private key from the public key is unfeasible.

In some implementations, verification address assignment component 110may be configured such that private keys may be stored within computingplatform(s) 104. For example, the first private key may be stored withina computing platform 104 and/or other locations associated with thefirst individual. In accordance with some implementation, a private keymay be stored in one or more of a “verify.dat” file, a SIM card, and/orother locations.

In some implementations, verification address assignment component 110may be configured such that multiple verification addresses may beassigned to separate individuals. For example, in addition to the firstverification address, a second verification address may be assigned tothe first individual. One or more additional verification addresses maybe assigned to the first individual, in accordance with one or moreimplementations.

The address recordation component 112 may be configured to recordidentifiers and biometric data associated with the individuals atcorresponding verification addresses. For example, the first identifierand first biometric data associated with the first individual may berecorded at the first verification address. Recording information at agiven verification address may include recording a hash or otherencrypted representation of the information. In some implementations,different biometric data may be recorded at multiple verificationaddresses assigned to a single given individual. For example, inaddition to the first identifier and the first biometric data associatedwith the first individual being recorded at the first verificationaddress, the first identifier and second biometric data associated withthe first individual may be recorded at a second verification address.

Generally speaking, biometric data may include metrics related to humancharacteristics. Biometric identifiers are distinctive, measurablecharacteristics that can be used to label and describe individuals.Biometric identifiers are typically include physiologicalcharacteristics, but may also include behavioral characteristics and/orother characteristics. Physiological characteristics may be related tothe shape of an individual's body. Examples of physiologicalcharacteristics used as biometric data may include one or more offingerprint, palm veins, face recognition, DNA, palm print, handgeometry, iris recognition, retina, odor or scent, and/or otherphysiological characteristics. Behavioral characteristics may be relatedto a pattern of behavior of an individual. Examples of behavioralcharacteristics used as biometric data may include one or more of typingrhythm, gait, voice, and/or other behavioral characteristics.

The biometric data may include one or more of an image or other visualrepresentation of a physiological characteristic, a recording of abehavioral characteristic, a template of a physiological characteristicand/or behavioral characteristic, and/or other biometric data. Atemplate may include a synthesis of relevant features extracted from thesource. A template may include one or more of a vector describingfeatures of a physiological characteristic and/or behavioralcharacteristic, a numerical representation of a physiologicalcharacteristic and/or behavioral characteristic, an image withparticular properties, and/or other information.

Biometric data may be received via computing platforms 104 associatedwith the individuals. For example, biometric data associated with afirst individual may be received via a first computing platform 104associated with the first individual. The first computing platform 104may include an input device (not depicted) configured to capture and/orrecord a physiological characteristic and/or behavioral characteristicof the first individual. Examples of such an input device may includeone or more of a camera and/or other imaging device, a fingerprintscanner, a microphone, an accelerometer, and/or other input devices.

The user interface component 114 may be configured to provide aninterface for presentation to individuals via associated computingplatforms 104. The interface may include a graphical user interfacepresented via individual computing platforms 104. According to someimplementations, the interface may be configured to allow a givenindividual to add or delete verification addresses assigned to the givenindividual so long as at least one verification address is assigned tothe given individual.

In some implementations, user interface component 114 may be configuredto access and/or manage one or more user profiles and/or userinformation associated with users of system 100. The one or more userprofiles and/or user information may include information stored byserver(s) 102, one or more of the computing platform(s) 104, and/orother storage locations. The user profiles may include, for example,information identifying users (e.g., a username or handle, a number, anidentifier, and/or other identifying information), security logininformation (e.g., a login code or password), system accountinformation, subscription information, digital currency accountinformation (e.g., related to currency held in credit for a user),relationship information (e.g., information related to relationshipsbetween users in system 100), system usage information, demographicinformation associated with users, interaction history among users inthe system 100, information stated by users, purchase information ofusers, browsing history of users, a computing platform identificationassociated with a user, a phone number associated with a user, and/orother information related to users.

The machine-readable instructions 106 may be executable to perform blockchain-based multifactor personal identity verification using theverification addresses.

The verification request component 116 may be configured to receive oneor more identifiers in connection with one or more requests to verify anidentity of one or more individuals. For example, the first identifiermay be received in connection with a request to verify an identity ofthe first individual. Requests for identity verification may be providedin connection with and/or related to financial transactions, informationexchanges, and/or other interactions. Requests may be received fromother individuals and/or other third parties.

The information extraction component 118 may be configured to extractthe biometric data associated with the one or more individuals from thecorresponding verification addresses. For example, the first biometricdata associated with the first individual may be extracted from thefirst verification address. Extracting information (e.g., biometricdata) from a verification address may include decrypting information.

According to some implementations, information extraction component 118may be configured such that, responsive to receiving the request toverify the identity of the first individual, a prompt may be provided tothe first individual for biometric data matching the first biometricdata and a private key matching the first private key. The prompt may beconveyed via a computing platform 104 associated with the firstindividual. The prompt may be conveyed via a graphical user interfaceand/or other user interface provided by the computing platform 104associated with the first individual. The prompt may include anindication that is one or more of visual, audible, haptic, and/or otherindications.

In some implementations, information extraction component 118 may beconfigured such that, responsive to receiving the request to verify theidentity of the first individual, a prompt may be provided to acomputing platform 104 associated with the first individual. The promptmay cause the computing platform 104 to automatically provide, toserver(s) 102, biometric data matching the first biometric data and/or aprivate key matching the first private key.

The identity verification component 120 may be configured to verify theidentity of the one or more individuals upon, or in response to,receiving matching biometric data and private keys. For example, thepersonal identity of the first individual may be verified upon receiptof (1) biometric data matching the first biometric data and (2) aprivate key matching the first private key. Verifying the personalidentity of the first individual may include comparing storedinformation with newly received information.

According to some implementations, identity verification component 120may be configured such that the personal identity of the firstindividual may be verified upon receipt of (1) biometric data matchingthe first biometric data or the second biometric data and (2) a privatekey matching the first private key. Such implementations may provideso-called “M-of-N” signatures for identity verification where somesubset of a larger set of identifying information is required.

In some implementations, identity verification component 120 may beconfigured such that the biometric data matching the first biometricdata and the private key matching the first private key may be used tosign the verification of the personal identity of the first individual.

A cryptographic signature is a mathematical mechanism that allowssomeone to prove ownership. In the case of Bitcoin, a Bitcoin wallet andits private key(s) are linked by some mathematical magic. When yourBitcoin software signs a transaction with the appropriate private key,the whole network can see that the signature matches the bitcoins beingspent. However, there is no way for the world to guess your private keyto steal your hard-earned bitcoins.

In some implementations, at least one dedicated node performs thesigning of the verification of the personal identity of the firstindividual. A given dedicated node may include one or more of theserver(s) 102. The given dedicated node may be a public node or aprivate node configured for creating new blocks and/or for signingverification.

In some implementations, server(s) 102, computing platform(s) 104,and/or external resources 122 may be operatively linked via one or moreelectronic communication links. For example, such electroniccommunication links may be established, at least in part, via a networksuch as the Internet and/or other networks. It will be appreciated thatthis is not intended to be limiting, and that the scope of thisdisclosure includes implementations in which server(s) 102, computingplatform(s) 104, and/or external resources 122 may be operatively linkedvia some other communication media.

A given computing platform 104 may include one or more processorsconfigured to execute machine-readable instructions. Themachine-readable instructions may be configured to enable an expert oruser associated with the given computing platform 104 to interface withsystem 100 and/or external resources 122, and/or provide otherfunctionality attributed herein to computing platform(s) 104. By way ofnon-limiting example, the given computing platform 104 may include oneor more of adesktop computer, a laptop computer, a handheld computer, atablet computing platform, a NetBook, a Smartphone, a gaming console,and/or other computing platforms.

External resources 122 may include sources of information, hosts and/orproviders of virtual environments outside of system 100, externalentities participating with system 100, and/or other resources. In someimplementations, some or all of the functionality attributed herein toexternal resources 100 may be provided by resources included in system100.

Server(s) 102 may include electronic storage 124, one or more processors126, and/or other components. Server(s) 102 may include communicationlines, or ports to enable the exchange of information with a networkand/or other computing platforms. Illustration of server(s) 102 in FIG.1 is not intended to be limiting. Server(s) 102 may include a pluralityof hardware, software, and/or firmware components operating together toprovide the functionality attributed herein to server(s) 102. Forexample, server(s) 102 may be implemented by a cloud of computingplatforms operating together as server(s) 102.

Electronic storage 124 may comprise non-transitory storage media thatelectronically stores information. The electronic storage media ofelectronic storage 124 may include one or both of system storage that isprovided integrally (i.e., substantially non-removable) with server(s)102 and/or removable storage that is removably connectable to server(s)102 via, for example, a port (e.g., a USB port, a firewire port, etc.)or a drive (e.g., a disk drive, etc.). Electronic storage 124 mayinclude one or more of optically readable storage media (e.g., opticaldisks, etc.), magnetically readable storage media (e.g., magnetic tape,magnetic hard drive, floppy drive, etc.), electrical charge-basedstorage media (e.g., EEPROM, RAM, etc.), solid-state storage media(e.g., flash drive, etc.), and/or other electronically readable storagemedia. Electronic storage 124 may include one or more virtual storageresources (e.g., cloud storage, a virtual private network, and/or othervirtual storage resources). Electronic storage 124 may store softwarealgorithms, information determined by processor(s) 126, informationreceived from server(s) 102, information received from computingplatform(s) 104, and/or other information that enables server(s) 102 tofunction as described herein.

Processor(s) 126 may be configured to provide information processingcapabilities in server(s) 102. As such, processor(s) 126 may include oneor more of a digital processor, an analog processor, a digital circuitdesigned to process information, an analog circuit designed to processinformation, a state machine, and/or other mechanisms for electronicallyprocessing information. Although processor(s) 126 is shown in FIG. 1 asa single entity, this is for illustrative purposes only. In someimplementations, processor(s) 126 may include a plurality of processingunits. These processing units may be physically located within the samedevice, or processor(s) 126 may represent processing functionality of aplurality of devices operating in coordination. The processor(s) 126 maybe configured to execute machine-readable instruction components 108,110, 112, 114, 116, 118, 120, and/or other machine readable instructioncomponents. Processor(s) 126 may be configured to executemachine-readable instruction components 108, 110, 112, 114, 116, 118,120, and/or other machine-readable instruction components by software;hardware; firmware; some combination of software, hardware, and/orfirmware; and/or other mechanisms for configuring processingcapabilities on processor(s) 126. As used herein, the term“machine-readable instruction component” may refer to any component orset of components that perform the functionality attributed to themachine-readable instruction component. This may include one or morephysical processors during execution of processor readable instructions,the processor readable instructions, circuitry, hardware, storage media,or any other components.

It should be appreciated that although machine-readable instructioncomponents 108, 110, 112, 114, 116, 118, and 120 are illustrated in FIG.1 as being implemented within a single processing unit, inimplementations in which processor(s) 126 includes multiple processingunits, one or more of machine-readable instruction components 108, 110,112, 114, 116, 118, and/or 120 may be implemented remotely from theother machine-readable instruction components. The description of thefunctionality provided by the different machine-readable instructioncomponents 108, 110, 112, 114, 116, 118, and/or 120 described below isfor illustrative purposes, and is not intended to be limiting, as any ofmachine-readable instruction components 108, 110, 112, 114, 116, 118,and/or 120 may provide more or less functionality than is described. Forexample, one or more of machine-readable instruction components 108,110, 112, 114, 116, 118, and/or 120 may be eliminated, and some or allof its functionality may be provided by other ones of machine-readableinstruction components 108, 110, 112, 114, 116, 118, and/or 120. Asanother example, processor(s) 126 may be configured to execute one ormore additional machine-readable instruction components that may performsome or all of the functionality attributed below to one ofmachine-readable instruction components 108, 110, 112, 114, 116, 118,and/or 120.

FIG. 2 illustrates a method 200 for establishing verification addresseson a block chain in order to provide block chain-based multifactorpersonal identity verification, in accordance with one or moreimplementations. The operations of method 200 presented below areintended to be illustrative. In some implementations, method 200 may beaccomplished with one or more additional operations not described,and/or without one or more of the operations discussed. Additionally,the order in which the operations of method 200 are illustrated in FIG.2 and described below is not intended to be limiting.

In some implementations, one or more operations of method 200 may beimplemented in one or more processing devices (e.g., a digitalprocessor, an analog processor, a digital circuit designed to processinformation, an analog circuit designed to process information, a statemachine, and/or other mechanisms for electronically processinginformation). The one or more processing devices may include one or moredevices executing some or all of the operations of method 200 inresponse to instructions stored electronically on an electronic storagemedium. The one or more processing devices may include one or moredevices configured through hardware, firmware, and/or software to bespecifically designed for execution of one or more of the operations ofmethod 200.

At an operation 202, identifiers may be associated with individualshaving previously verified personal identities. A first identifier maybe associated a first individual. The first individual may have apreviously verified personal identity. Operation 202 may be performed byone or more hardware processors configured to execute a machine-readableinstruction component that is the same as or similar to individualidentifier component 108 (as described in connection with FIG. 1), inaccordance with one or more implementations.

At an operation 204, verification addresses on a block chain may beassigned to the individuals. A given verification address may include apublic key and a private key. A first verification address may beassigned to the first individual. The first verification address mayinclude a first public key and a first private key. Operation 204 may beperformed by one or more hardware processors configured to execute amachine readable instruction component that is the same as or similar toverification address assignment component 110 (as described inconnection with FIG. 1), in accordance with one or more implementations.

At an operation 206, identifiers and biometric data associated with theindividuals may be recorded at corresponding verification addresses. Thefirst identifier and first biometric data associated with the firstindividual may be recorded at the first verification address. Theidentity of the one or more individuals may be verifiable upon, or inresponse to, receiving matching biometric data and private keys. Thepersonal identity of the first individual may be verifiable upon, or inresponse to, receipt of (1) biometric data matching the first biometricdata and (2) a private key matching the first private key. Operation 206may be performed by one or more hardware processors configured toexecute a machine-readable instruction component that is the same as orsimilar to address recordation component 112 (as described in connectionwith FIG. 1), in accordance with one or more implementations.

FIG. 3 illustrates a method 300 for performing block chain-basedmultifactor personal identity verification using verification addresses,in accordance with one or more implementations. The operations of method300 presented below are intended to be illustrative. In someimplementations, method 300 may be accomplished with one or moreadditional operations not described, and/or without one or more of theoperations discussed. Additionally, the order in which the operations ofmethod 300 are illustrated in FIG. 3 and described below is not intendedto be limiting.

In some implementations, method 300 may be implemented in one or moreprocessing devices (e.g., a digital processor, an analog processor, adigital circuit designed to process information, an analog circuitdesigned to process information, a state machine, and/or othermechanisms for electronically processing information). The one or moreprocessing devices may include one or more devices executing some or allof the operations of method 300 in response to instructions storedelectronically on an electronic storage medium. The one or moreprocessing devices may include one or more devices configured throughhardware, firmware, and/or software to be specifically designed forexecution of one or more of the operations of method 300.

At an operation 302, one or more identifiers may be received inconnection with one or more requests to verify an identity of one ormore individuals. A first identifier may be received in connection witha request to verify an identity of a first individual. Operation 302 maybe performed by one or more hardware processors configured to execute amachine-readable instruction component that is the same as or similar toverification request component 116 (as described in connection with FIG.1), in accordance with one or more implementations.

At an operation 304, biometric data associated with the one or moreindividuals may be extracted from corresponding verification addresseson a block chain. A given verification address may include a public keyand a private key. First biometric data associated with the firstindividual may extracted from a first verification address assigned tothe first individual. The first verification address may include a firstpublic key and a first private key. Operation 304 may be performed byone or more hardware processors configured to execute a machine-readableinstruction component that is the same as or similar to informationextraction component 118 (as described in connection with FIG. 1), inaccordance with one or more implementations.

At an operation 306, the identity of the one or more individuals may beverified upon, or in response to, receiving matching biometric data andprivate keys. The personal identity of the first individual may beverified upon, or in response to, receipt of (1) biometric data matchingthe first biometric data and (2) a private key matching the firstprivate key. Operation 306 may be performed by one or more hardwareprocessors configured to execute a machine-readable instructioncomponent that is the same as or similar to identity verificationcomponent 120 (as described in connection with FIG. 1), in accordancewith one or more implementations.

Exemplary implementations may facilitate storing personal data on theblock chain. The personal data may be stored on the block chain in anencrypted way. A person may be identified at the block chain level withone or more of a private key, a finger print, a finger print hash, aneye retina, an eye retina hash, and/or other unique information. Thedata stored may include or relate to one or more of a passport, anidentification card, extracted passport information, a driver's license,extracted driver's license information, finger print, eye retina, and/orother information. According to some implementations, if some of thedata is changed, a new record may be created for that person in theblock chain. That is, all changes are added as new records. The oldrecord will always be stored on the block chain. Generally speaking, allrecords on the block chain are stored forever and cannot be removed.More than one copy of the block chain will exist to ensure the recordsare not manipulated.

Exemplary implementations may facilitate access to personal data. Theremay be multiple access levels for the personal data in the block chain.Access controls may be grated on public/private key pairs levels.Examples of access levels may include one or more of Super Admin (fullaccess to block chain), Authorities-country level (full read-onlyaccess), Authorities-state/local level (limited read-only access),Police and other services including Emergency (access to certainpersonal data by Finger Print/Eye retina of that person only),Participating Merchants (limited access), and/or other access levels.

Exemplary implementations may facilitate verification check. There maybe multiple levels for how it is possible to check verification. Forexample, some implementations may ensure a person has a record at“Company” but no personal data is provided. Some implementations mayensure a person has a record at Company and get very basic personalinformation such as Full Name, DOB, Gender, and/or other basicinformation. Some implementations may ensure a person has a record atCompany and get all personal data.

Although the present technology has been described in detail for thepurpose of illustration based on what is currently considered to be themost practical and preferred implementations, it is to be understoodthat such detail is solely for that purpose and that the technology isnot limited to the disclosed implementations, but, on the contrary, isintended to cover modifications and equivalent arrangements that arewithin the spirit and scope of the appended claims. For example, it isto be understood that the present technology contemplates that, to theextent possible, one or more features of any implementation can becombined with one or more features of any other implementation.

1-50. (canceled)
 51. A system for providing blockchain-based personal identity verification, the system comprising: one or more computer-readable storage media configured to store a blockchain; a computer system comprising one or more processors programmed to execute computer program instructions that, when executed, cause the computer system to: assign a verification address associated with the blockchain to an individual, the individual having a previously verified personal identity; store, at the one or more computer-readable storage media, an identifier of the individual and biometric information of the individual in association with the verification address associated with the blockchain, and wherein the biometric information is related to biometric data of the individual, and the verification address is derived from private and public keys; obtain, from a client-side device, the identifier and biometric data in connection with a request to verify the individual's identity, the request indicating the verification address associated with the blockchain; obtain the stored identifier and the stored biometric information using the verification address indicated in the request; and sign verification of the individual's identity responsive to a determination that the identifier of the request and the biometric data of the request match the stored identifier and the stored biometric information.
 52. The system of claim 51, wherein the computer system is caused to: sign, using the private key from which the verification address was derived, the verification of the individual's identity responsive to the determination that the identifier of the request and the biometric data of the request match the stored identifier and the stored biometric information.
 53. The system of claim 52, wherein the computer system is caused to: store, at the one or more computer-readable storage media, the private key in association with the verification address associated with the blockchain; obtain, from the client-side device, the private key in connection with the request to verify the individual's identity; obtain the stored private key using the verification address indicated in the request; and sign, using the private key, the verification of the individual's identity responsive to a determination that the identifier of the request, the biometric data of the request, and the private key of the request match the stored identifier, the stored biometric information, and the stored private key.
 54. The system of claim 53, wherein the private key is also stored on the client-side device, and wherein the client-side device is a user device of the individual.
 55. The system of claim 51, wherein the computer system is caused to: assign another verification address associated with the blockchain to the individual; store, at the one or more computer-readable storage media, additional biometric information of the individual in association with the other verification address associated with the blockchain, the additional biometric information being information related to additional biometric data of the individual; obtain, from the client-side device, the additional biometric information in connection with the request to verify the individual's identity, the request further indicating the other verification address associated with the blockchain; obtain the stored additional biometric information using the other verification address indicated in the request; and sign the verification of the individual's identity responsive to a determination that the identifier of the request, the biometric data of the request, and the additional biometric data of the request match the stored identifier, the stored biometric information, and the stored additional biometric information, wherein the additional biometric information is different from the biometric information.
 56. The system of claim 55, wherein the server-side computer system is caused to: obtain, via a user interface, a user-initiated command to add the other verification address as an address of the blockchain for the individual; and assign the other verification address associated with the blockchain to the individual based on the user-initiated command.
 57. The system of claim 55, wherein the computer system is caused to: obtain, via a user interface, a user-initiated command to remove the other verification address as an address of the blockchain for the individual; and de-associate the other verification address associated with the blockchain from the individual based on the user-initiated command.
 58. The system of claim 51, wherein the computer system is caused to: provide a first user, different than the individual, access to data stored at the one or more computer-readable storage media in association with the verification address associated with the blockchain, the first user being provided access to the stored data based on verification that the first user has a first private key, the first private key being different the private key from which the verification address was derived; and denying a second user, different than the individual, access to the stored data based on verification that the second user has a second private key.
 59. The system of claim 51, wherein the biometric information comprises an image, a recording, or a template and/or the biometric information is related to a fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina, odor, gait, or voice.
 60. The system of claim 51, wherein the biometric information is stored on the blockchain.
 61. The system of claim 51, wherein the stored biometric information is a biometric hash.
 62. The system of claim 51, wherein the biometric information and the identifier are different from each other.
 63. The system of claim 51, wherein the computer system includes a server-side computer.
 64. A method of providing blockchain-based personal identity verification, the method being implemented by a computer system comprising one or more processors executing computer program instructions that, when executed, perform the method, the method comprising: storing, by the computer system, a blockchain at one or more computer readable storage media of the computer system; assigning, by the computer system, a verification address associated with the blockchain to an individual, the individual having a previously verified personal identity; storing, by the computer system, at the one or more computer-readable storage media, an identifier of the individual and biometric information of the individual in association with the verification address associated with the blockchain, wherein the biometric information is related to biometric data of the individual and wherein the verification address is derived from private and public keys, obtaining, by the computer system, from a client-side device, the identifier and biometric data in connection with a request to verify the individual's identity, the request indicating the verification address associated with the blockchain; obtaining, by the computer system, the stored identifier and the stored biometric information using the verification address indicated in the request; and assigning, by the computer system, verification of the individual's identity responsive to a determination that the identifier of the request and the biometric data of the request match the stored identifier and the stored biometric information.
 65. The method of claim 64, comprising: signing, by the computer system, using the private key from which the verification address was derived, the verification of the individual's identity responsive to the determination that the identifier of the request and the biometric data of the request match the stored identifier and the stored biometric information.
 66. The method of claim 65, comprising: storing, by the computer system, at the one or more computer-readable storage media, the private key in association with the verification address associated with the blockchain; obtaining, by the computer system, from the client-side device, the private key in connection with the request to verify the individual's identity; obtain the stored private key using the verification address indicated in the request; and signing, by the computer system, using the private key, the verification of the individual's identity responsive to a determination that the identifier of the request, the biometric data of the request, and the private key of the request match the stored identifier, the stored biometric information, and the stored private key.
 67. The method of claim 64, comprising: assigning, by the computer system, another verification address associated with the blockchain to the individual; storing, by the computer system, at the one or more computer-readable storage media, additional biometric information of the individual in association with the other verification address associated with the blockchain, the additional biometric information being information related to additional biometric data of the individual; obtaining, by the computer system, from the client-side device, the additional biometric data in connection with the request to verify the individual's identity, the request further indicating the other verification address associated with the blockchain; obtaining, by the computer system, the stored additional biometric information using the other verification address indicated in the request; and signing, by the computer system, the verification of the individual's identity responsive to a determination that the identifier of the request, the biometric data of the request, the other biometric data of the request match the stored identifier, the stored biometric information, and the stored additional biometric information.
 68. The method of claim 67, comprising: obtaining, by the computer system, via a user interface, a user-initiated command to add the other verification address as an address of the blockchain for the individual; and assigning, by the computer system, the other verification address associated with the blockchain to the individual based on the user-initiated command.
 69. The method of claim 67, comprising: obtaining, by the computer system, via a user interface, a user-initiated command to remove the other verification address as an address of the blockchain for the individual; and de-associating, by the computer system, the other verification address associated with the blockchain from the individual based on the user-initiated command.
 70. The method of claim 64, comprising: providing, by the computer system, a first user, different than the individual, access to data stored at the one or more computer-readable storage media in association with the verification address associated with the blockchain, the first user being provided access to the stored data based on verification that the first user has a first private key, the first private key being different the private key from which the verification address was derived; and denying, by the computer system, a second user, different than the individual, access to the stored data based on verification that the second user has a second private key.
 71. The method of claim 64, wherein the biometric data comprises an image, a recording, or a template and/or the biometric information is related to a fingerprint, palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina, odor, gait, or voice.
 72. The method of claim 64, wherein the biometric information is stored on the blockchain.
 73. The system of claim 64, wherein the stored biometric information is a biometric hash.
 74. The system of claim 64, wherein the biometric information and the identifier are different from each other.
 75. The system of claim 64, wherein the computer system includes a server-side computer.
 76. A system for providing blockchain-based personal identity verification, the system comprising: one or more computer-readable storage media configured to store a blockchain; a computer system comprising one or more processors programmed to execute computer program instructions that, when executed, cause the computer system to: assign multiple verification addresses of the blockchain to the individual, the individual having a previously verified personal identity, the multiple verification addresses include a first verification address associated with the blockchain and a second verification address associated with the blockchain; store, at the one or more computer-readable storage media, (i) an identifier of the individual and first biometric information of the individual in association with the first verification address associated with the blockchain and (ii) second biometric information of the individual in association with the second verification address associated with the blockchain, wherein the first biometric information is information related to first biometric data of the individual, and the second biometric information is information related to second biometric data of the individual, and wherein the first verification address is different from first private and public keys from which the first verification address was derived, and the second verification address is different from second private and public keys from which the second verification address was derived; obtain, from a client-side device, the identifier, the first biometric data, and the second biometric data in connection with a request to verify the individual's identity, the request indicating the first verification address associated with the blockchain and the second verification address associated with the blockchain; obtain (i) the stored identifier and the stored first biometric information using the first verification address indicated in the request and (ii) the stored second biometric information using the second verification address indicated in the request; and sign, using the private key from which the first verification address was derived, verification of the individual's identity responsive to a determination that the identifier of the request, the first biometric data of the request, and the second biometric data of the request match the stored identifier, the stored first biometric information, and the stored second biometric information; provide a first user, different than the individual, access to data stored at the one or more computer-readable storage media in association with the first verification address associated with the blockchain, the first user being provided access to the stored data based on verification that the first user has a first private key, the first private key being different the private key from which the first verification address was derived and different from the private key from which the second verification address was derived; and deny a second user, different than the individual, access to the stored data based on verification that the second user has a second private key.
 77. The system of claim 76, wherein the stored first biometric information is a first biometric hash and the stored second biometric information is a second biometric hash.
 78. The system of claim 76, wherein the identifier and the first biometric information and the second biometric information are each different from each other.
 79. The system of claim 76, wherein the computer system includes a server-side computer.
 80. A system for providing blockchain-based personal identity verification, the system comprising: one or more hardware processors configured by machine-readable instructions to: establish verification addresses on a blockchain by: associating identifiers with individuals having previously verified personal identities, a first identifier being associated a first individual, the first individual having a previously verified personal identity; assigning verification addresses on a blockchain to the individuals, a given verification address including a public key and a private key, a first verification address being assigned to the first individual, the first verification address including a first public key and a first private key; and recording identifiers and biometric information associated with the individuals at corresponding verification addresses, the first identifier and first biometric data associated with the first individual being recorded at the first verification address; and perform blockchain-based personal identity verification using the verification addresses by: receiving one or more identifiers in connection with one or more requests to verify an identity of one or more individuals, the first identifier being received in connection with a request to verify an identity of the first individual; extracting the biometric information associated with the one or more individuals from the corresponding verification addresses, the first biometric information associated with the first individual being extracted from the first verification address; obtaining, from a client-side device, identifiers and biometric data in connection with a request to verify the identity of one or more individuals, the request indicating the verification address or addresses associated with the blockchain; and verifying the identity of the one or more individuals upon receiving matching biometric data and private keys, the personal identity of the first individual being verified upon receipt of (1) biometric data matching the first biometric data and (2) a private key matching the first private key. 