Secure authentication and financial attributes services

ABSTRACT

Provided are devices, interfaces, methods, and systems for secure authentication of identity of information including identification data and financial attributes, wherein the secure authentication comprises storing identity information in a protected data repository with a private data record, assigning a reference identifier for a private data record in a protected data repository, receiving a request for authenticating identity information comprising a reference identifier and public identity information, requesting access to private identity information through a private approval interface with said reference identifier, requesting a portion of said private data record from said protected data repository, verifying identity information from said portion of private data record and public identity information, responding with an authentication or multi-valent response.

BACKGROUND

An essential need exists to protect personal identity data while alsomaking this identity data available to process financial transactions.While a great deal of effort has focused on practices of authentication,encryption, protection, and security, these practices rely on thetransmission of data to process financial transactions. Personalidentity data is oftentimes transmitted during the process ofauthentication and financial services in order to process transactions.However, such approaches expose businesses to excessive liability andconsumers to possibility of having private identity data compromised.For businesses, reducing costs of protecting private consumer data leadsto greater profitability, while for consumers, reducing exposure ofprivate identity data leads to greater security.

Authentication and financial services systems often rely on applicationto propound information in a manner that is useful for verifyingidentity and obtaining financial services. Personal identity data isprovided by a consumer on a loan, for example, and the information isinputted into a database. The data is checked and processed, and yetconsumer records are held within a business database. The identityinformation often includes private data such as a social security numberthat may be encrypted or not, and transmitted in other transactions orinternal to an organization. Such data, is an essential identifyingfeature for a consumer, and yet also vulnerable because it is a numberthat is assigned to a person for the duration of a lifetime. Therefore apractice and service that allows a consumer to obtain improvedauthentication and financial transactions advantageously protectsbusinesses and consumers.

Additional transactions encompass the transmission of private data thatpertains to a consumer that is not otherwise public information. Creditcard numbers, as another example, are often held in business systems inorder to process transactions on behalf of the customer. A business thatrecords credit card numbers results in costly expenditures to businessesfor the security and protection of consumer information. Furthermore,the cost of indemnifying and discovering fraudulent credit activity isan expensive cost to credit card companies. Therefore a practice andservice that allows businesses to transact financial services such ascredit card transactions without the exposure of credit card numbersadvantageously protects credit card companies, businesses that depend oncredit, as well as consumers.

SUMMARY

The purpose of Secure Authentication and Financial Attributes Servicesis to provide authentication and financial services using personalidentity data while retaining the privacy of certain identity andfinancial attributes. These services operate in a manner that separatesto varying degrees private identity data and public identity data fromauthentication and financial services. Private identity data is heldseparately from financial transactions at various times during the useof such data, in order to restrict the transmission of private data.Businesses may excise the cost and practice of holding private consumerdata, as well as the risks of liability and exposure on account ofhaving such data in their possession. Consumers may accordingly havevarious controls on their private identity data and the use of this datafor authentication and financial transactions, as well as affordableassurance that such data is unavailable as a general rule. Providingextensive controls to consumers of identity data and financialattributes provides great confidence for purchase transactions of alllevels. Providing configurable controls to businesses of theauthentication and financial services provides even greater protectionof profits and interests. The practice of secure authentication andfinancial attributes services encompasses devices, methods, and systemsthat leverage these controls for the advantages of businesses andconsumers. The breadth of financial services encompasses transactions ofany monetized format.

One of the essential and yet vulnerable types of private data that anyand all consumers require is an identification number. In the UnitedStates of America, the Social Security Number is assigned by thegovernment agency for every citizen at birth. This record staticidentification number is retained by the consumer during the course ofone's lifetime. However, this number is also used repeatedly in order toobtain and to qualify for financial services such as applications,credits, loans, and taxes, and so forth. The number, however, were itobtained by a malicious third party, could be a factor in performing anactions that is often referred to as “identity theft”. Therefore, one ofthe most preferred uses of the practice is to resolve the steps requiredfor the authentication of a consumer identity that are used forfinancial transactions without the transmission of a Social SecurityNumber.

For the purpose of an illustrative example, the practice retains privatedata information for a consumer within a denetworked system and respondsto a request for a loan with a yes, or no, decision. The latitude andspan of the practice, however, provides a flexible and modular systemwherein any and all financial transactions are processable without thetransmission of private data over networked channels. Although examplesof the practice are illustrated with the use on a form interface of anidentification number in the present invention and Social SecurityNumber as prior art (FIGS. 7A, 7B), the full scope of the identityauthentication encompasses any manner of referencing a person or entity.

FIGURES

FIG. 1. Data Input and Memory Devices. A data input device allows aconsumer to input identity information into one or more memory storagedevices.

FIG. 2. Memory Devices and Data Retrieval. Data is accessed from amemory device with a memory process having connectivity to processorsand a cloud.

FIG. 3. Identifying Data and Secure Authentication. A flowchart forsecure authentication of identifying data.

FIG. 4. Financial Services Request, Third-Party. A flowchart for secureauthentication of identifying data and response to financial attributeservice request.

FIG. 5. Financial Services Request, Consumer. A flowchart for afinancial service request from a consumer at a Point of Sale.

FIG. 6. Point of Sale Purchase Card. A consumer purchase card havingselectable features.

FIG. 7. Financial Services Sample Form. Financial services applicationform with and without a SSN.

DETAILED DESCRIPTION

A secure authentication of identity commences first with receiving anidentification number for a person or entity. An identification numberor record is stored in a data memory. An identification number for acustomer may be a Social Security Number. An identification number foran entity may be an Employer Identification Number. A data memory may bein the format of a solidstate device, or it may be a device that is on anetwork such as the internet, an intranet, extranet, deepnet, and/or acloud. The identification record is held in memory that is accessible toa processor. The processor is able to make at least basic operationssuch as comparisons and computations. The processor interfaces with thedata memory in order to retrieve at least a portion of theidentification record such as a number.

For each unique identification number, a record also has stored areference number that a consumer uses to reference an identity record.The identification number in this example may be a Social SecurityNumber. While a reference number comprises a portion that the consumermay use for applications and forms rather than the Social SecurityNumber. The reference number may comprise a static and/or dynamicportion. The reference number may mask or encrypt the identificationnumber. The data record comprises at least equivalent identifyingfeatures of the identity of a person.

The processor receives a reference number for the purposes ofauthenticating the identity of a consumer. The processor also receivesidentifying information about the person's identity. The identifyinginformation may comprise information that is public and/or private. Theidentifying information may accompany the authentication request at thetime of receipt, or according to a desired time differential. Publicidentifying information may include an address, telephone number, or anykind of information that is available on a public record. Privateidentifying information may include identifying features that are knownprivately by the consumer, such as biographical details, taxable income,and/or personal information. The identifying information may alsoinclude a private verification protocol through a telephone number, textmessage, finger print, or other unique referencing identifiers orauthentication protocols.

The consumer has the ability to control access to the identifying numberwith the desired methods of providing an accompanying identifyinginformation. The consumer may provide settings for the availability ofaccessing the identifying number for the purposes of authentication.Settings may include number of accesses, time of access, address oflocation, entity permissions, rendezvous timing, recurring access,and/or desirable rules that customize the level of security of theidentifying number for consumer. The consumer may be notified of arequest for authentication through a digital interface, such as througha telephonic prompt, sms text, electronic mail, voice mail, or otheralert or notification of a request to access private identityinformation.

The processor receives public and/or private identifying informationfrom the consumer and/or a third party. The consumer provides theidentifying information to the processor and/or data record. Theconsumer provides the identifying information from an interface that hasconnectivity through an internet, intranet, extranet, cloud, solidmemory, chip, a physical input at a node, or a method of input that isnon-electronic. Identifying information may be held in the data recordwith the identification number and reference number or may be held inanother port of memory that is accessible to the processor or that theprocessor receives data from. The size of such memory may be from a bitor less, a chip card, an identification card, to macromemory devicessuch as a drive, shared resources, or to networked resourced such as acloud. Information may be recorded and/or stored in any manner thatallows a processor to receive the information or to request theinformation when queried to authenticate the identity of a consumer.Transmission of data to, from, with, accompanying, and between theprocessor and memory may be conducted in any desired protocol such as asecure channel, private-key encryption, integrated circuit, as well asnon-electronic transmissions.

The processor receives public and/or private identifying information fora consumer from a third party. The third party supplies the informationor requests the information on behalf of the consumer. The consumer mayprovide a consent or an authorization for the authentication ofidentifying. The consumer may provide a static or dynamic reference codein order to authorize the authentication. The consumer may provide rulesor settings in order to control access to the authentication protocol.The authentication may require input from the consumer in order tocomplete the authentication request. The processor receives or retrievesthe components of the authentication request from the consumer and thethird party. The processor then performs a process of authenticating theconsumer's identity according to the data provided. The processor may bea crypto, secure, private, distributed, quantum, parcel, mapping,deconvoluting, or encrypted processor.

The third party may, for example, provide a physical address, telephonicaddress, name, and Zip code of the consumer. The consumer may benotified that the third party is requesting authentication. Theprocessor retrieves data from one or more memory records with theidentifying data, or has data supplied to it. Authentication of theidentity is accomplished with data check, verification, deconvolution,or any practice of comparing the validity of and/or matching the valueof data. The processor responds to a request to authenticate identitywith binary response such as yes/no as well as a condition, status,request, bit, code, number, and/or provision of data. Responses mayfurthermore elicit additional requests and transmission of data.

The response of the processor to the authentication request provides amethod for the system to respond to the authentication of a consumeridentity in a multi-valent manner. Multi-valent responses allows theauthentication to respond with confirmation of an identity, as well asmore complex responses. Examples of the multi-valent responses that arecomplex encompass the likes of provisional authentication,authentication with indication, authentication with request, and/or anegatived authentication with one or more error codes. Error codes couldindicate the kind of mismatch of data, missing data, suspicious data,and proprietary indicia. Furthermore, authentication responses, or theirnegatives, may additional accompany a payment increment, fee, toll,and/or token.

A third party may request various levels of authentication ofinformation that may comprise a fee structure according to the level ofdetail. A third party could require: a surface match with regards to asocial security reference that matches with address, a history matchwith regards the purchases and debts, a more extensive background checkthat cross-checks personal accounts with biographic details, or anexhaustive probe that exposits the results of a thorough examination ofall of a consumer's personal and financial records. As such, the datarecord for a consumer may moreover comprise data for and/or access topublic and private records that comprise financial attributes such ascredit report, tax transcripts, court records, medical records, and/orany type of record that refers to, depends upon, references, or islinked to the identity of a person and/or entity. A third-party may alsocause to have data transmitted to, with, preceding, or following anauthentication request.

The practice of and service to the authentication of identity may beprovided through computer or digital systems. Interfaces to theprocessor for a consumer may be an internet website, wirelessconnectivity, automated programming interface (API), automatedcleaminghouse, batch processes, secure sockets, direct coding, and/orsoftware calls. The consumer may input data through a human-memoryinterface that is assisted through a node, terminal, website, and/orcomputer interface. The interface may include physical components thatare transported or shipped to and from the consumer.

A physical interface may include a solidstate memory device that may beaccessible only one time, a limited number of times, or unlimited numberof times in order to record personal data of the consumer. Personal datamay include social security numbers, account numbers, biometric data,and/or biographical information. A physical-digital interface may beprovide to the consumer in order to input this data in an alphanumeric,digital, audio, electromagnetic, and/or frequentive input. The interfacemay be sent to and received from the consumer. The data from aninterface may be recorded onto, into, through, and/or coded in a datamemory record. The data record is accessible directly or indirectly tothe processor. The memory device may comprise a processor thatinterfaces with the authentication request processor, or may be accessedthrough another processor that interprets between processors.

A data memory device may be inaccessible to a signal or caused to beinaccessible to an electronic signal. The processor that accesses a datamemory device may be inaccessible to an electronic signal or caused tobe inaccessible to an electronic signal. The processor that retrievesdata from a data memory device may comprise a probe or sensor thattransmits and/or receives a signal in an optical, wavelength,electromagnetic, molecular compound, combinatorial, thermal, and/orstructural format. The data device receives and/or transmits a datasignal in an optical, wavelength, electromagnetic, molecular compound,combinatorial, thermal, and/or structural format.

The memory device and/or the processor may receive an electronic signaland subsequently be rendered inaccessible to electronic signals. Thememory device and/or the processor may receive an electronic signal andsubsequently be rendered inaccessible to electronic signals. The memorydevice may be rendered inaccessible in order to protect the data fromelectronic reading and/or writing. The memory device may undergotransformation of physical, chemical, structural, crystallographic,electric, thermal, and/or phase states. Data may be stored, written,encoded, and/or incorporated in or with a physical, chemical,structural, crystallographic, electric, electronic, optical, thermal,and/or phase states of matter. The memory device and/or the processormay have been rendered inaccessible to electronic signals and renderedaccessible. A device or processor may be rendered accessible orinaccessible through a physical, electromagnetic, interference, and/orthermal device or apparatus such as a shield or scrambler. A device orprocessor may be rendered accessible or inaccessible through a timingdevice, sensor, probe, radiation, thermal, and/or chemical sequence orcombination of exposures.

The memory device communicates a signal to the processor with one ormore of the methods accessible and/or transformational states. Thememory device and processor may also communicate in electronic formatsthrough cifer, interpreter, key, quanta, piranha, rubrix, shibboleth,signals, sublimate, tokens, and/or encrypted data. The processor mayread, sense, determine, or register that a signal or state of the memorydevice. The memory device and processor may be programmed with rulesregarding the accessibility of the data and/or device. Accessibility,signals, state, and/or rules are implemented in order to protect theintegrity and security of the data. A routine or sequence of one or moreof these signals, states, and/or rules may be programmed, calculated,determined, and/or handled in order to grant an access accessibility forthe processor to retrieve data. Data is communicated in one or more ofthese methods to and from one or more memory devices and processors.

In order to authenticate the consumer data, a processor retrieves datafrom the memory device and receives consumer data from theauthentication request. One or more processors conduct the operation ofauthenticating the consumer data. The processor responds with adeterminate signal or status of the consumer identity. The processor mayalso respond in one or more of the confirmation or complex responses asdefined above. The processor that retrieves data from the memory devicemay be a transmission chip or simple query device that responds withdata in a format for a processor performing the authentication check.Separating the function of processors into low-level operations and datastorage protects the integrity and security of consumer data.Implementing memory devices that respond in non-electronic ways providesdegrees of separation that protect and secure data. The practice ofperforming authentication of consumer data using the memory devices thatare accessible in non-electronic ways further protects the integrity andsecurity of consumer data.

One preferred embodiment of the method protecting and securing data isthe protection of credit card information during transactions. The datafor financial transactions, for example, is moved from customer tobusiness to credit card company to business to business transactions.With the use of the reference number, customers can be provided with newpurchase and sales cards that allow the use of remote b2b transactionsin order to process credit card purchase. Merchants and sellers wouldnot need to store credit card information in order to processtransactions. One or more reference numbers of the customers, in staticand/or dynamic format, would allow a purchase card to process at a pointof sale system and supply the needed information to approve atransaction without transmitting a credit card number from the point ofsale device. A smartphone or electronic device with selectable accountsalso may be used at a point of sale device. Rather, with the one or morereference numbers the purchase card provides the data that the point ofsale device uses to process a transaction with a system having aprocessor that processes the transaction with a credit card company onbehalf of the customer.

In the embodiment having the one or more reference numbers and a creditcard. Processing of a transaction may proceed first with the method ofauthenticating identity as described above. Processing a transaction mayproceed without a response for authenticating identity or with amulti-valent response as described above. In a portion of a data memorydevice, credit card numbers may be stored. The customer may haveprovided these numbers through a graphical user interface or a devicethat allows for inputting of account numbers. The consumer may selectaccounts for use with a purchase and/or at a point of sale. The consumermay use one card for purchase while drafting from one or more paymentdebit, credit, money, derivative, resource buffer, future, pool,donation, and/or bank accounts.

The consumer may also provide settings that automate the selection ofone or more credit card accounts in order to process one or moretransactions. Previous settings on the priority or preferential use ofcredit card accounts allows customers to preselect cards for specificuses, such as for food, groceries, fuel, utilities, exchanges,marketplaces, and/or bets. Selection of an account may activate thepurchase card for use and/or configure a chip or stripe for use at apoint of sale device. The purchase card may be a Smart Card that isprogrammable by the consumer or a third-party for use at a POS. Theconsumer can trace and track the details regarding third party requestsfor financial services such as with the time of request and type offinancial service conducted. One or more reports or statements maygenerate or caused to be generated through any one or more contact,inquiry, request, transaction, notification, authorization, purchase,and/or sale. One or more consumers, entities, networks, systems,commissions, agencies, registers, logs, inquiries, officials, bots,persons, and/or transcripts receive/access to track and/or trace the oneor more systems and/or practice that implement one or more financialservices.

A purchase card may work on and/or with existing merchant accounts,automated clearinghouse, debit, automated teller machine, and/or creditcard transaction systems. Arrangements and configurations may be used totransact purchases automatically and/or automated. Purchases may beinitiated and/or transacted by or on behalf of one or more consumersand/or entities. Similarly sales may be conducted using a system as in asales card rather than a purchase card. As such families may apportionbudgetary monies towards accounts that are accessible by one or morepersons. Business entities may provide a purchase and/or sales card inorder to acquire and/or purchase of materials, goods, services,contracts, transactions, and/or exchanges. Consumers and/or entities mayjoint accounts with access to shared resources. An entity may cause oneor more purchase and/or sales actions to occur and/or operate.

The arrangement of accounts, purchases, and/or sales may be doneautomatically, with triggers, timing, ranges, thresholds, notification,authorization, or any consumer or supplier control. The customer mayalso, or alternatively, use a programmable purchase card or purchasedevice that transmits with a reference number a code or selection of anaccount to use. A purchase card or device may comprise a chip, display,buttons, indicia, touch-screen and/or touch-sensitive areas that makeselections at the time of purchase, at other desired times at the pointof sale device, and/or by the customer. Similarly, the point of saledevice may also be equipped with such features in order to processcustomer accounts and/or to process coupons and/or incentives of theretailer or seller. These selections at the point of sale device may besupplied at the time of sale in order to adjust prices. The use of apreferred embodiment of the system allows one or more consumers and/orentities to arrange and configure a customizable system/s and/orinfrastructure/s to conduct purchases and/or sales according to privatemeans that are undetectable in public networks. Portions of a system mayor may not contain private, personal, financial, and/or identityinformation on a public network, internet, intranet, extranet, and/orcloud.

A preferred embodiment serves financial decisions according to customerinformation and third-party data. Processing of a transaction mayproceed first with the method of authenticating identity as describedabove. Processing a transaction may proceed without a response forauthenticating identity or with a multi-valent response as describedabove. A third-party defines a procedure for making financial decisionsthat comprise one or more rules, programs, regulations, computations,formulas, criterions, and/or evaluations needed to respond to a requestfor and/or inquiry into a financial service such as auction, barter,credit, derivative, exchange, future, hedge, loan, purchase, refinance,increment, stock, bond, trade, grant, distribution, approval,conditional, request, substitution, transfer, liability, debt,collection, and/or sale of a monetary value. A system may be implementedin order to extend, expand, retract, cancel, and/or recall one or morefinancial services. Any entity that uses financial services mayimplement the process of rendering financial decisions. A purchase,sales, service, and/or transaction system may be implemented as asubstitute to, competitive with, to supplement, advantageously position,to price, and/or perform auxiliary functions with one or more existingfinancial systems, exchanges, marketplaces, and/or networks. One or moreprocedures from one or more entities may be implemented to render one ormore financial decisions for one or more customers and/or entities.

The entities may be actuarial, banking, government, revenue, insurance,medical, manufacturers, exchanges, marketplaces, consumer goods, and/orservice companies or organizations that use or reference a SocialSecurity Number and/or Employer Identification Number. The third-partyrequests the reference number of a customer and additional identifyingfeatures such as address and telephone number as defined above. Theidentifying information of the customer may be used to authenticateidentity of a customer, entity, and/or a third-party. This request maybe through a paper form, digital format, graphical interface, website,automated programming interface, audial format, keypad, telephonicformat, and/or electronic input. Similarly the entity may define aprocedure through one or more request formats for inputting a procedure.The procedure may translated into one or more program, script,interface, language, code, symbol, and encrypted formats. The proceduremay be sent with requests or may be requested from another entity,customer, processor, and/or data memory. Procedures may be run in one ormore automated form, batch, clearinghouse, register, and/or shell.

A processor retrieves a third-party procedure and a processor retrievescustomer information. A processor processes the customer informationaccording to the third-party procedure. The third-party procedure isimplemented to apply custom defined logic to the data of the customer.The processor responds to the request for verification for financialattributes to the third-party. Specific financial data and/oridentifying data may, or may not, be provided in the response from aprocessor to a third-party. The customer may or may not be notified ofthe request. The customer may or may not be prompted to grant permissionto access identity and/or financial data. The customer may or may nothave set financial data in a data memory record similar to theidentifying information as discussed above. The customer may or may notbe prompted about a conditional response that may or may not requirepermission about a decision of a third-party procedure. The customer mayor may not receive information about further actions to obtain afinancial product from one or more third-parties. The customer may ormay not receive advertisements from third-parties. Customer data andresponse may or may not be forwarded to one or more third-parties suchas a financial services entity or marketplace. A customer, third-party,or entity processing the authentication and/or request may receiveincentive, compensation, reward, credit, or commission for processingand/or completing a request.

The third-party procedure may be defined by the third-party, on behalfof a third-party, or for a third party. A procedure may be defined byone or more procedures from one or more individuals, entities,organizations, and/or groups. A procedure defines a set of logicalconditions comprising one or more rules, definitions, programs,regulations, computations, formulas, criterions, and/or evaluationsneeded to respond to a request for and/or inquiry into a financialservice such as auction, barter, credit, derivative, exchange, future,hedge, loan, purchase, refinance, increment, stock, bond, trade, grant,distribution, approval, conditional, request, substitution, transfer,and/or sale of a monetary value. The procedure may be used to mask afinancial service. The procedure may be used to conceal informationabout a customer and/or third-party from transmission relating to afinancial service. A processor completes a procedure that may or may notresult in a response. A processor completes a procedure that may or maynot result a read, write, or update of data memory. The procedure mayrequire additional steps or sequences, request information, exchangedata, or obtain procedures in order to complete a request. The processoror procedure may respond with a multi-valent response. A multi-valentresponse may accompany an authentication of identity. A multi-valentresponse may further include one or more indication, condition, requestfor more information, time-sensitive response, offer, purchase, sale,instruction, recommendation, denial, transcript, title, lien, deed,bill, record, receipt, or statement.

A procedure defines a set of logical conditions that establish a way toevaluate a procedure or request. As genera, the procedure refers toidentification and/or financial data, wherein a procedure requests atleast one of these types of data in order to respond to a request. Oneof the purposes of the procedure is to define a procedure for thecriterion to authenticate identity. For example, identity in a form mayneed to be authenticated according to a time, location, probability,and/or likelihood. Identity may also need to be authenticated usingfinancial data such as tax records, credit card transactions, purchases,sales, and other kinds of transactions that indicate the time andlocation of a person. A procedure that authenticates identityfurthermore responds with one or more responses that may or may not bein a multi-valent format. Procedures may be defined in a manner that isgeneric for computational and/or human methods of authenticatinginformation depending on the level of sensitivity of the person and/orinformation. An automated system that operates the services may defineprocedures that third-parties may use. One or more procedures coulddefine governmental regulations for conducting actuary, business,commerce, pricing, exchanges, transactions, transfers, purchases, sales,tax revenue, tariffs, risk, and/or loans. Or third-parties may defineprocedures that the service uses to provide customized authenticationand/or responses. Procedures may be programmed with one or moreflowcharts, process diagrams, scripts, programs, executibles, tags,codes, languages, assembly, in-chip, and/or on-chip implements. Theprocedure may be defined as a software program or in hardware circuits.A procedure may be performed by a processor in one or more local,distributed, remote, cloud, or server computers.

For financial services, the procedure encodes the logic used todetermine financial decisions. A procedure automates the process ofmaking financial decisions or decisions that use financial data. Acustomer application for a loan in one example of the procedure forauthentication and response. A loan form routinely includes personalinformation including name and contact information. The form, however,may include an identifying number or reference for the customer that aprocedure uses to authenticate the identity of the customer. Anotherprocedure could operate to obtain the financial information of thecustomer. A procedure could respond with a query to the customer tosupply current income, debt, and address. The procedure couldautomatically obtain this data from information provided by thecustomer. Another procedure could obtain the credit score and report onbehalf of the customer and store the data in a memory device. Anotherprocedure operates to process the financial information according to theevaluation process of the loan application. Procedures may automate anyfinancial transaction wherein data may or may not be transmitted betweena third party and services system. Procedures may be used to recordinformation and/or to respond with business decisions.

EXPLANATION OF FIGURES

The following explanation of figures exemplifies embodiments of furtherpreferred and illustrative devices, interfaces, methods, and systems forsecure authentication of identifying data and financial attributesservices. The following embodiments are meant for illustrative purposesand not to limit the span or breadth of the envisioned inventions.

FIG. 1. Data Input and Memory Devices. A data input device allows aconsumer to input identity information into one or more memory storagedevices. Consumer inputs information, 100, through an input device suchas a keyboard or keypad. A portion of the data, 110, is stored on anetworked cloud, 120, and another portion on a memory device, 140. Thememory device may be inaccessible to another electronic device afterstoring the data. A consumer may update and/or modify informationthrough an interface to the memory device or to a memory record in aremote location for processor procedures.

FIG. 2. Memory Devices and Data Retrieval. Data is accessed from amemory device, 200, with a memory process having connectivity toprocessors and a cloud, 240. Data from a set of memory devices, 220, isretrieved by a memory processor, 200. The memory devices operate with anaccompanying sensor, 210, or supply device that responds to a requestfrom the memory device to supply identifying data. The perforated linesrepresent accessible or inaccessible connectivity through an electronicsignal. The memory processor sends an interrogative signal to the sensorto obtain data from the memory device. The memory processor providesdata to one or more processors, 230, to authenticate the data orretrieve identifying data and/or financial attributes. The personal datais available only to the processors and for a certain amount of time.Personal data may not be stored on a processor or accessible to thecloud. The processor responds through a cloud interface to a request.

FIG. 3. Identifying Data and Secure Authentication. A flowchart forsecure authentication of identifying data. A request for authenticationaccompanies personal identifying information, 300. A request processoroptionally uses the identifying information to notify a customer of arequest for authentication. The dotted lines represent optional sequenceor process flow. Notification may be sent through a sms text, emailalert, telephonic interface, and/or automated preselected response. Therequest processor forwards the identifying information to a dataprocessor. The customer responds to the notification of the request forauthentication. The data processor obtains identifying number, 310, fromthe memory device if the customer approves the request. The dataprocessor otherwise forwards the customer response to the authenticationprocessor. The authentication processor authenticates the personal datafrom the memory device and the identifying data that accompanies therequest for authentication, 300, if the customer approves the request.The authentication response, 320, provides the results of theauthentication processor according to the identifying informationprovided in the request and the customer response to authenticationnotification.

FIG. 4. Financial Services Request, Third-Party. A flowchart for secureauthentication of identifying data and response to financial attributeservice request. A request for authentication accompanies personalidentifying information, 400, and a selection for a procedure to processfinancial attribute data, 410. A request for financial service may beinitiated with a form interface (FIG. 7A). A request processoroptionally uses the identifying information to notify a customer of arequest for authentication. The dotted lines represent optional sequenceor process flow. Notification may be sent through a sms text, emailalert, telephonic interface, and/or automated preselected response. Therequest processor forwards the identifying information to a dataprocessor. The customer responds to the notification of the request forauthentication. The data processor obtains identifying data andfinancial attributes, 420, from the memory device if the customerapproves the request. The memory processor obtains the Social SecurityNumber and using the identifying information obtains an identificationnumber from the memory device. The memory processor obtains a financialattribute such as income level. The data processor otherwise forwardsthe customer response to the authentication processor. Theauthentication processor authenticates the personal data from the memorydevice and the identifying data, 400, and financial attributes, 420, ifthe customer approves the request. The authentication processor forwardsthe results of the authentication to the procedure processor.

The authentication response, 420, forwards the results and the procedureselection, 410, to the procedure processor. The procedure processorobtains the selected procedure logic, 430. The procedure processorprocesses the financial attributes, 420, according to the logic of theprocedure, 430. Auxiliary processes may be used to obtain additionaldata or service, either remote or local, through a network or software.Additional data may be a supplemental information required to processthe financial service. Additional service may be a request for CreditReport from a Credit Bureau. The procedure processor responds with anauthentication response, 440, and a multi-valent response, 450. Themulti-valent response comprises an approval and a loan amount. Theprocedure processor provides the results of the authentication processoraccording to the identifying information provided in the request, thecustomer response to authentication notification, the identifying data,and the financial attributes.

FIG. 5. Financial Services Request, Consumer. A flowchart for afinancial service request from a consumer at a Point of Sale. Aflowchart for requesting a financial service at a POS. A request forauthentication accompanies personal identifying information, 500, and aselection for an account from a purchase card to process purchaserequest, 510 (FIG. 6). The consumer presets the accounts for selectionthrough an input device and data input interface with connectivity to acloud data record (FIGS. 1, 2). A digital shopping cart, or storeregister, provides the currency amount to be purchased, 560, such as theamount in USD. A request processor optionally uses the identifyinginformation to notify a customer of a request for authentication. Thedotted lines represent optional sequence or process flow. Notificationmay be sent through a sms text, email alert, telephonic interface,and/or automated preselected response. The request processor forwardsthe identifying information to a data processor. The customer respondsto the notification of the request for authentication. The dataprocessor obtains identifying data and account number, 520, from thememory device if the customer approves the request. The data processorotherwise forwards the customer response to the authenticationprocessor. The memory processor using the account selection obtains acredit card account number from a cloud memory and using the identifyinginformation obtains an identification number from the memory device(FIG. 2). The authentication processor authenticates the consumer datafrom the memory device and the identifying data, 500, and identificationnumber and account number, 520, if the customer approves the request.The authentication processor forwards the results of the authenticationto the procedure processor.

The authentication processor, 520, forwards the results and the accountselection, 510, to the procedure processor. The procedure processorobtains the selected procedure logic, 530. The procedure processorprocesses a financial transaction with the account number, 520,according to the logic of the procedure, 530, and purchase amount, 560through a credit card network with connectivity through the auxiliarytransactions. The procedure processor responds with an authenticationresponse, 540, and a multi-valent response, 550. The multi-valentresponse comprises a transaction number and timestamp. The procedureprocessor provides the results of the authentication processor as amulti-valent response according to the identifying information, theidentification number, the customer response to authenticationnotification, the account selection, and the purchase amount.

FIG. 6. Point of Sale Purchase Card. A consumer purchase card, 600,having selectable features, 620. The purchase card may be used at apoint of sale device and processes the purchase through a procedure. Thepurchase card initiates the financial services request and sendsidentifying information to a request processor (FIG. 5). The consumermay select a financial account from the purchase card, 620. The accountselection sets the microchip to provide the account selection and isprogrammed through the electronic connectivity, 630, from the selectablefeatures, 620, to the microchip, 610. The purchase card is inserted intoa Point of Sale system that reads the microchip, 610. The request forfinancial service of a purchase is transmitted to a request processor.The account is sent with the request along with the identifyinginformation. A purchase transaction using a credit card account isprocessed through the procedure processor. The request receives amulti-valent response of authentication and completion of purchasetransaction.

FIG. 7. Financial Services Sample Form Interface. Financial servicesapplication form with and without a SSN. A form for financial servicesincludes identifying information of a consumer. A form requestsinformation with an identifying number that authenticates without aSocial Security Number, 700. The Social Security Number is stored in amemory device and retrievable through a memory processor (FIGS. 1, 2,4). A request for authentication and financial service such as a loan isprocessed without the consumer providing the Social Security Number on aform interface. A prior art form interface requires the consumer toprovide the Social Security Number in order to process a request forfinancial service.

Definitions

Identifying Number. A number that refers to, points to, references,calls, symbolizes, signifies, and/or gives an address a person,individual, group, and/or entity. Examples of identifying numbersinclude Social Security Number, Employer Identity Number, driver'slicense, a customer number, a medical ID number, a serial number, abar-code, and/or an anonymity identifier.

Address. An address refers to one or more mailing address, telephonictelephone number, IP address, domain name, account, number, user login,email address, and/or any way of refer to a location or presence of aperson, individual, group, and/or entity. An address may be static,dynamic, referential, sequential, or combinations thereof.

An anonymity identifier. An identifier that may be used when assigning anumber when referring to a person, individual, group, and/or entity forthe purposes of statistical, medical, informational, governmental, ororganizational purposes.

A number may be an alphanumeric, cardinal, ordinal, decimal, quantumstate, and/or fractional number, and combinations thereof.

A third-party may retain anonymity, remain anonymous, or be publiclyknown. An anonymous third-party could be, i.e., a bank advertisingcredit card offers to customers. A known third-party could be aninsurance company processing an application form of a customer in orderto obtain health msurance.

A financial service. An auction, barter, credit, derivative, exchange,future, hedge, loan, purchase, refinance, increment, stock, bond, trade,grant, distribution, approval, conditional, request, substitution,transfer, and/or sale or a monetary value. Any manner, procedure, means,instrument, or process involving any action of, for, by and/or on behalfof a monetary value. Monetary value may be a currency, credit, metal,note, and/or any form of referring to some-thing of value.

A multi-valent response. Data that signifies one or more modes ofinformation, such as a decision and a confirmation number. Modes ofinformation include gradients, scales, litmus, advisory, alert, caution,signs, symbols, signals, colors, wavelengths, frequencies, and anymanner of encoding information. One or more types or forms of data mayaccompany, associate, follow, precede, refer to, sequence, and/ortransmit with one or more modes of communication within any duration orspan of time.

POS. Point of Sale Device.

Applicant claims the following:
 1. A system for a consumer to make apurchase at a register, comprising a store register, wherein theregister comprises a digital cart, payment server, and point of saledevice; a financial transaction server; a secure authentication server;a payment server; wherein the financial transaction server receives apayment request, sent from a payment server from a first consumer torecord a credit of money for a future second consumer, wherein thefuture second consumer is anonymous to the first consumer; the firstconsumer uses the payment server to credit an amount of money to afinancial account using a data record that comprises an account numberfor the future second consumer and further receives electronic data thatrepresents personal identifying information for an anonymous futuresecond consumer, wherein the personal identifying information comprisesone or more of a credit score, taxable income, biographical details,biometrics, medical condition, or zip code; the transaction serverstores the credit in a financial account in an electronic clearinghouseusing an electronic data record that contains an electronic address thatrefers to personal identifying information of a future consumer;wherein, after a duration of time, at a register, the secureauthentication server receives an electronic request, sent by a registerfrom consumer purchase device that a second consumer requests topurchase a good or service, the consumer having personal identifyinginformation and the good or service having a first price; the electronicrequests comprise electronic data comprising personal identifyinginformation of the consumer using a data record, wherein the personalidentifying information further comprises a digital number ordescription of a credit score, taxable income, medical condition,biographical details, biometrics, zip code, or combinations thereof; theconsumer purchase device provides the electronic data in the form of adigital address that is encrypted by the device and sent to theauthentication server by the register in encrypted form; theauthentication server authenticates the identity of the consumer bysending an electronic notification to an identity check processor toauthenticate the consumer and receives an electronic signal that eitherconfirms or does not confirm that consumer identity and theauthentication validates the encrypted digital address by confirming itmatches a digital address of the customer that is stored in memory data;the authentication server sends an electronic request for electronicmoney to the financial transaction server comprising electronic datathat represents personal identifying information in the form of anelectronic address based on a confirmed identity and address of theconsumer that requested to purchase a good or service at a register; thefinancial transaction server receives the request for electronic moneyin the form of an encrypted electronic address and the transactionserver authenticates the electronic address, the transaction serverevaluates the address using a clearinghouse processor that locatesfinancial accounts that have an address that matches the address sentfrom the authentication server, and receives an electronic notificationfrom the clearinghouse processor for a matching account address that isavailable for the consumer based on the electronic address; thetransaction server, using the electronic notification, locates thefinancial account, debits money from the account, and generates anelectronic notification that is sent to the register, wherein theelectronic notification comprises the amount of the money and anelectronic reference number for the money; the register receives theelectronic notification and determines a second price for a good basedon the money in the account by calculating the difference between theprice of the good and the money available to the second consumer fromthe first consumer; the register initiates a payment request from thesecond consumer using a point of sale device for the calculated price;the second consumer completes a payment process using the point of saledevice for the good based on the second price and debits electronicmoney from a payment device for the amount of the second price; and theregister initiates a collection request for the money based on thereference number from the transaction server; and the store registerreceives electronic money from the transaction server and from the pointof sale device in an amount that is determined as the first price of thegood.
 2. The system of claim 1, wherein the authentication server haspreviously confirmed the identity of the first consumer by using anelectronic device and requesting validation of identifying informationfrom an identity verification server using an application programminginterface with an electronic data record that comprises a driver'slicense number, fingerprint, or government identifier, theauthentication server transmits, via a network interface, a request froma smartphone or electronic device that comprises a code to authorizeauthentication, and the first consumer transmits, via the networkinterface, a response using a digital interface on the electronic deviceto the authentication server to confirm the personal identity.
 3. Thesystem of claim 2, wherein the first consumer comprises a plurality ofconsumers that each use a payment server to credit money to a financialaccount for a second consumer and the server further receives electronicdata that represents personal identifying information for an anonymoussecond consumer, wherein the personal identifying information comprisesone or more of a credit score, taxable income, biographical details,biometrics, medical condition, or zip code; and the transaction serverstores a plurality of credits in a matching plurality of financialaccounts with an electronic clearinghouse using an electronic datarecord that contains an electronic address that refers to personalidentifying information of a second consumer.
 4. The system of claim 2,wherein the authentication server has previously confirmed the identityof the future second consumer by using an electronic device andrequesting validation of identifying information from an identityverification server or an application programming interface with aelectronic data record that comprises a driver's license number from agovernment agency, the authentication server transmits, via a networkinterface, a request to a smartphone or electronic device that comprisesa code to authorize authentication, and the future second consumertransmits, via a network interface, a response using a digital interfaceon an electronic device to the authentication server to confirm thepersonal identity.
 5. The system of claim 4, wherein the authenticationserver transmits a digital request to the future second consumer on anelectronic device with a digital form that requests personal identifyingdata of the consumer comprising one or more of a credit score, taxableincome, biographical details, biometrics, medical condition, or zipcode, the server further transmits a digital request to a government orcredit agency to authenticate the personal identifying data of thesecond consumer, the server evaluates each of the authenticated data andgenerates a reference number for each of the personal identifying dataof the consumer that is an anonymity identifying number and anidentification number for the consumer, the server generates at leastone electronic address by storing at least one reference number andidentification number in the memory of a digital clearinghouseprocessor, wherein the electronic address comprises a sequence ofreference numbers.
 6. The system of claim 5, wherein the transactionserver transmits, via a network interface, a request to theclearinghouse processor that comprises at least one electronic address,the clearinghouse processor retrieves a data record using the electronicaddress, wherein the data record in the clearinghouse has an electronicaddress that matches the electronic address transmitted by the server,wherein the data record comprises a financial account number thatcontains within it electronic money, and the processor transmits theaccount number to the transaction server.
 7. The system of claim 1,wherein the first consumer uses the payment server to credit money to afinancial account using a data record that comprises an identificationnumber for a good or service, wherein the number is a bar-code oralphanumeric number and optionally the first price of the good isdetermined at a register by calculating a new price based on the valueof a coupon.
 8. The system of claim 1, wherein the digital cartcomprises goods for purchase and for each good in the digital cart, theauthentication server sends an electronic request for electronic moneyto the financial transaction server comprising electronic data thatcomprises an identification number for the good or service; thefinancial transaction server receives the request for electronic moneyin the form of the electronic address for the second consumer and theidentification number for the good, the transaction server evaluates theaddress and number using a clearinghouse processor that locatesfinancial accounts that have an address that matches the address and anumber that matches the identification number sent from theauthentication server, and receives an electronic notification from theclearinghouse processor for a matching account address that is availablefor the consumer based on the electronic address; the transaction serverusing the electronic notification locates the financial account, debitsmoney from the account, and generates an electronic notification that issent to the register, wherein the electronic notification comprises theamount of the money and an electronic reference number for the money;the register receives the electronic notification and determines asecond price for each of the goods based on the money from the accountsby calculating the difference between the price of the good and themoney available to the second consumer for the good.
 9. The system ofclaim 1, wherein the first consumer is an entity selected from abanking, credit, government, insurance, medical, manufacturer, exchange,marketplace, consumer goods, service companies, or agencies.
 10. Thesystem of claim 1, wherein the payment server further uses a cryptoprocessor to process a payment and wherein the digital money comprises adigital token payment or digital currency payment.
 11. A method formaking a purchase at a store register, wherein the method uses a storeregister, financial transaction server, secure authentication server,and payment server, wherein the register comprises a digital cart,payment server, and point of sale device; a first customer initiates apayment by transmitting a digital signal to a financial transactionserver using a payment device that requests to record a credit of moneyfor a future second customer, wherein the future second customer isanonymous to the first customer, the payment server responds bygenerating a digital interface with which the customer uses to selectpersonal identifying information for an anonymous future secondconsumer, wherein the personal identifying information comprises one ormore of a credit score, taxable income, biographical details,biometrics, medical condition, or zip code and select an amount of moneyto credit to for a future second customer; after the processor completesthe payment request by collecting digital money from the first customerusing a digital payment device, the transaction server transmits a datarecord to an electronic clearinghouse for storing in data memory,wherein the record comprises the digital address and amount of thecredit of the digital money; the electronic clearinghouse stores thedigital address and amount in a retrievable memory processor such thatthe clearinghouse can retrieve a reference number to the digital moneyusing the digital address, wherein the address refers to personalidentifying information of an anonymous future customer; wherein, aftera duration of time, at a register, the second customer using a cart addsgoods for purchase to a shopping cart; the second customer initiates adigital request to a register to purchase the goods, wherein the secondcustomer has personal identifying information and optionally a purchasedevice; the register initiates a digital request to a secureauthentication server to request electronic money for making thepurchase of the goods for the second customer, wherein the first andsecond customers are anonymous to each other; the register or paymentdevice transmits a electronic data record comprising personalidentifying information of the second customer and the good having afirst price, wherein the personal identifying information furthercomprises a digital number or description of a credit score, taxableincome, medical condition, biographical details, biometrics, zip code,or combinations thereof; the consumer purchase device provides theelectronic data in the form of a digital format that is encrypted by thedevice and sent to the authentication server by the register inencrypted form, wherein the digital format is a digital address; theauthentication server sends an electronic data record to an identitycheck processor to authenticate the consumer using a portion of thepersonal identifying information and receives an electronic signal thateither confirms or does not confirm that consumer identity and validatesthe encrypted digital address by confirming it by comparing the digitaladdress with digital addresses accessible to the server that are storedin memory data of the server; the authentication server sends anelectronic request for electronic money to the financial transactionserver, wherein the request comprises an electronic data record thatrepresents personal identifying information in the form of an electronicaddress based on a confirmed identity and address of the consumer and anidentification number for the good for purchase; the transaction serverevaluates the address using an electronic clearinghouse processor thatlocates financial accounts that have an address that matches the addresssent from the authentication server and the server receives anelectronic notification from the clearinghouse processor that a matchingaccount address is available for the second consumer based on theelectronic address; the transaction server, using the electronicnotification, requests the electronic money from the clearinghouse,which retrieves access to the financial account, debits electronic moneyfrom the account, and generates an electronic notification that is sentto the register, wherein the electronic notification comprises theamount of the money and an electronic reference number for the money;the transaction server sends a data record to the register comprisingthe amount of money and electronic reference to the money; theclearinghouse processor debits the account for the digital money andstores the digital funds in a retrievable digital memory; the registerreceives the electronic notification and determines a second price for agood based on the money retrieved for the second customer by calculatingthe difference between the price of the good and the money available tothe second consumer from the first consumer; the register initiates apayment request from the second consumer using a point of sale devicefor the calculated second price; the second consumer generates a digitalpayment for the good in an amount of second price and completes apayment using a payment device or point of sale device for the goodbased on the second price, wherein the payment for an amount of thesecond device is debited from a payment account of the second customer;and the register initiates a digital request to the transaction serverto collect the digital money from the transaction server and a digitalrequest to the payment device or point of sale device for digital moneyfrom the second customer; and the store register receives electronicmoney from the transaction server and from the payment device or pointof sale device, records purchase of the good in digital memory of theregister, and stores in the digital memory reference numbers for thepayments collected from the transaction server and second customerpayment in an amount that is determined as the first price of the good.12. The method of claim 11, wherein the authentication server processesconfirmation of the identity of the first consumer before the customermakes initiates a first payment to an anonymous future second customerby requesting authentication at a digital interface using an interfacein digital form on an electronic device from an identity verificationserver using an application programming interface and an electronic datarecord that comprises a driver's license number, fingerprint, orgovernment identifier, the authentication server transmits, via anetwork interface, a request that comprises a code to authorizeauthentication, and the first consumer transmits, via the networkinterface, a response using a digital interface on the electronic deviceto the authentication server to confirm the personal identity.
 13. Themethod of claim 12, wherein the first consumer comprises a plurality ofconsumers that each initiate payment separately at a payment server tocredit money to a financial account the second consumer and the serverfurther receives electronic data that represents personal identifyinginformation for an anonymous second consumer, wherein the personalidentifying information comprises one or more of a credit score, taxableincome, biographical details, biometrics, medical condition, or zipcode; and the transaction server stores a plurality of credits in amatching plurality of financial accounts with an electronicclearinghouse using an electronic data record that contains anelectronic address that refers to personal identifying information of asecond consumer.
 14. The method of claim 12, wherein the authenticationserver confirms the identity of the future second consumer prior toinitiating a request to purchase a good by using an electronic deviceand requesting validation of identifying information from an identityverification server or an application programming interface with aelectronic data record that comprises a driver's license number from agovernment agency, the authentication server transmits, via a networkinterface, a request to a smartphone or electronic device that comprisesa code to authorize authentication, and the future second consumertransmits, via a network interface, a response using a digital interfaceon an electronic device to the authentication server to confirm thepersonal identity.
 15. The method of claim 14, wherein theauthentication server transmits a digital request to the future secondconsumer on an electronic device with a digital form that requestspersonal identifying data of the consumer comprising one or more of acredit score, taxable income, biographical details, biometrics, medicalcondition, or zip code, the server further transmits a digital requestto a government or credit agency to authenticate the personalidentifying data of the second consumer, the server evaluates each ofthe authenticated data and generates a reference number for each of thepersonal identifying data of the consumer that is an anonymityidentifying number and an identification number for the consumer, theserver generates at least one electronic address by storing at least onereference number and identification number in the memory of a digitalclearinghouse processor, wherein the electronic address comprises asequence of reference numbers.
 16. The method of claim 15, wherein thetransaction server transmits, via a network interface, a request to theclearinghouse processor that comprises at least one electronic address,the clearinghouse processor retrieves a data record using the electronicaddress, wherein the data record in the clearinghouse has an electronicaddress that matches the electronic address transmitted by the server,wherein the data record comprises a financial account number thatcontains within it electronic money, and wherein the processor transmitsthe account number to the transaction server.
 17. The method of claim11, wherein the first consumer uses the payment server to credit moneyto a financial account using a data record, wherein the data recordcomprises an identification number for a good or service, wherein thenumber is a bar-code or alphanumeric number, and wherein optionally thefirst price of the good is determined at a register by calculating a newprice based on the value of a coupon.
 18. The method of claim 11,wherein the digital cart comprises goods for purchase and for each goodin the digital cart, the authentication server sends an electronicrequest for electronic money to the financial transaction servercomprising electronic data that comprises an identification number forthe good or service; the financial transaction server receives therequest for electronic money in the form of the electronic address forthe second consumer and the identification number for the good, thetransaction server evaluates the address and number using aclearinghouse processor that locates financial accounts that have anaddress that matches the address and a number that matches theidentification number sent from the authentication server, and receivesan electronic notification from the clearinghouse processor for amatching account address that is available for the consumer based on theelectronic address; the transaction server using the electronicnotification locates the financial account, debits money from theaccount, and generates an electronic notification that is sent to theregister, wherein the electronic notification comprises the amount ofthe money and an electronic reference number for the money; the registerreceives the electronic notification and determines a second price foreach of the goods based on the money from the accounts by calculatingthe difference between the price of the good and the money available tothe second consumer for the good.
 19. The method of claim 11, whereinthe first consumer is an entity selected from a banking, credit,government, insurance, medical, manufacturer, exchange, marketplace,consumer goods, service companies, or agencies.
 20. The method of claim11, wherein the payment server further uses a crypto processor toprocess a payment and wherein the digital money comprises a digitaltoken payment or digital currency payment.