Systems and methods for providing block chain-based multifactor personal identity verification

ABSTRACT

Block chain-based multifactor personal identity verification may be provided. Verification addresses may be established on a block chain by: associating identifiers with individuals having previously verified personal identities, assigning verification addresses on a block chain to the individuals, and recording identifiers and biometric data associated with the individuals at corresponding verification addresses. Block chain-based multifactor personal identity verification using the verification addresses may be performed by: receiving one or more identifiers in connection with one or more requests to verify an identity of one or more individuals, extracting the biometric data associated with the one or more individuals from the corresponding verification addresses, and verifying the identity of the one or more individuals upon receiving matching biometric data and private keys.

FIELD OF THE DISCLOSURE

This disclosure relates to systems and methods for providing blockchain-based multifactor personal identity verification.

SUMMARY

One aspect of the disclosure relates to a system for providing blockchain-based multifactor personal identity verification. The system mayinclude one or more hardware processors configured by machine-readableinstructions to establish verification addresses on a block chain and/orperform block chain-based multifactor personal identity verificationusing the verification addresses. Establishing verification addresses onthe block chain may include associating identifiers with individualshaving previously verified personal identities, a first identifier beingassociated a first individual, the first individual having a previouslyverified personal identity; assigning verification addresses on a blockchain to the individuals, a given verification address including apublic key and a private key, a first verification address beingassigned to the first individual, the first verification addressincluding a first public key and a first private key; and recordingidentifiers and biometric data associated with the individuals atcorresponding verification addresses, the first identifier and firstbiometric data associated with the first individual being recorded atthe first verification address. Performing block chain-based multifactorpersonal identity verification using the verification addresses mayinclude receiving one or more identifiers in connection with one or morerequests to verify an identity of one or more individuals, the firstidentifier being received in connection with a request to verify anidentity of the first individual; extracting the biometric dataassociated with the one or more individuals from the correspondingverification addresses, the first biometric data associated with thefirst individual being extracted from the first verification address;and verifying the identity of the one or more individuals upon receivingmatching biometric data and private keys, the personal identity of thefirst individual being verified upon receipt of (1) biometric datamatching the first biometric data and (2) a private key matching thefirst private key.

Another aspect of the disclosure relates to a method for establishingverification addresses on a block chain in order to provide blockchain-based multifactor personal identity verification. The method maybe performed by one or more hardware processors configured bymachine-readable instructions. The method may include associatingidentifiers with individuals having previously verified personalidentities, a first identifier being associated a first individual, thefirst individual having a previously verified personal identity;assigning verification addresses on a block chain to the individuals, agiven verification address including a public key and a private key, afirst verification address being assigned to the first individual, thefirst verification address including a first public key and a firstprivate key; and recording identifiers and biometric data associatedwith the individuals at corresponding verification addresses, the firstidentifier and first biometric data associated with the first individualbeing recorded at the first verification address. The identity of theone or more individuals may be verifiable upon receiving matchingbiometric data and private keys, such that the personal identity of thefirst individual is verifiable upon receipt of (1) biometric datamatching the first biometric data and (2) a private key matching thefirst private key.

Yet another aspect of the disclosure relates to a method for performblock chain-based multifactor personal identity verification usingverification addresses. The method may be performed by one or morehardware processors configured by machine-readable instructions. Themethod may include receiving one or more identifiers in connection withone or more requests to verify an identity of one or more individuals, afirst identifier being received in connection with a request to verifyan identity of a first individual; extracting biometric data associatedwith the one or more individuals from corresponding verificationaddresses on a block chain, a given verification address including apublic key and a private key, first biometric data associated with thefirst individual being extracted from a first verification addressassigned to the first individual, the first verification addressincluding a first public key and a first private key; and verifying theidentity of the one or more individuals upon receiving matchingbiometric data and private keys, the personal identity of the firstindividual being verified upon receipt of (1) biometric data matchingthe first biometric data and (2) a private key matching the firstprivate key.

These and other features, and characteristics of the present technology,as well as the methods of operation and functions of the relatedelements of structure and the combination of parts and economies ofmanufacture, will become more apparent upon consideration of thefollowing description and the appended claims with reference to theaccompanying drawings, all of which form a part of this specification,wherein like reference numerals designate corresponding parts in thevarious figures. It is to be expressly understood, however, that thedrawings are for the purpose of illustration and description only andare not intended as a definition of the limits of the invention. As usedin the specification and in the claims, the singular form of “a”, “an”,and “the” include plural referents unless the context clearly dictatesotherwise.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a system for providing block chain-based multifactorpersonal identity verification, in accordance with one or moreimplementations.

FIG. 2 illustrates a method for establishing verification addresses on ablock chain in order to provide block chain-based multifactor personalidentity verification, in accordance with one or more implementations.

FIG. 3 illustrates a method for performing block chain-based multifactorpersonal identity verification using verification addresses, inaccordance with one or more implementations.

DETAILED DESCRIPTION

FIG. 1 illustrates a system 100 for providing block chain-basedmultifactor personal identity verification, in accordance with one ormore implementations. In some implementations, system 100 may includeone or more servers 102. The server(s) 102 may be configured tocommunicate with one or more computing platforms 104 according to aclient/server architecture, a peer-to-peer architecture, and/or otherarchitectures. The users may access system 100 via computing platform(s)104.

The server(s) 102 may be configured to execute machine-readableinstructions 106. The machine-readable instructions 106 may include oneor more of an individual identifier component 108, a verificationaddress assignment component 110, an address recordation component 112,a user interface component 114, a verification request component 116, aninformation extraction component 118, an identity verification component120, and/or other machine-readable instruction components.

The machine-readable instructions 106 may be executable to establishverification addresses on a block chain. Generally speaking, a blockchain is a transaction database shared by some or all nodesparticipating in system 100. Such participation may be based on theBitcoin protocol, Ethereum protocol, and/or other protocols related todigital currencies and/or block chains. A full copy of the block chaincontains every transaction ever executed in an associated digitalcurrency. In addition to transactions, other information may becontained by the block chain, such as described further herein.

The block chain may be based on several blocks. A block may include arecord that contains and confirms one or more waiting transactions.Periodically (e.g., roughly every one minute), a new block includingtransactions and/or other information may be appended to the blockchain. In some implementations, a given block in the block chaincontains a hash of the previous block. This may have the effect ofcreating a chain of blocks from a genesis block (i.e., the first blockin the block chain) to a current block. The given block may beguaranteed to come chronologically after a previous block because theprevious block's hash would otherwise not be known. The given block maybe computationally impractical to modify once it is included in theblock chain because every block after it would also have to beregenerated.

A given verification address may include a specific location on theblock chain where certain information is stored. In someimplementations, an individual verification address may be referred toas an “AtenVerify Address.” Verification addresses are further describedbelow in connection with verification address assignment component 110.

The individual identifier component 108 may be configured to associatedidentifiers with individuals having previously verified personalidentities. For example, a first identifier may be associated a firstindividual. The first individual may have a previously verified personalidentity. Generally speaking, an identifier may include one or more of anumber, an alphanumeric code, a username, and/or other information thatcan be linked to an individual. In some implementations, an individualidentifier may be referred to as an “Aten ID.”

In accordance with some implementations, an individual having apreviously verified personal identity may have obtained the previouslyverified personal identity through a variety of approaches. For example,in some implementations the individual may be required to provideevidence of the individual's identity. Such evidence may include one ormore of providing a copy of a government issued identification (e.g.,passport and/or driver's license), providing a copy of mail received bythe individual (e.g., a utility bill), evidence provided by a thirdparty, and/or other evidence on an individual's identity. The evidencemay be provided to an entity associated with server(s) 102.

The verification address assignment component 110 may be configured toassign verification addresses on a block chain to the individuals. Agiven verification address may include a public key and a private key.By way of example, a first verification address may be assigned to thefirst individual. The first verification address may include a firstpublic key and a first private key.

Generally speaking, a public and private key-pair may be used forencryption and decryption according to one or more public keyalgorithms. By way of non-limiting example, a key pair may be used fordigital signatures. Such a key pair may include a private key forsigning and a public key for verification. The public key may be widelydistributed, while the private key is kept secret (e.g., known only toits proprietor). The keys may be related mathematically, but calculatingthe private key from the public key is unfeasible.

In some implementations, verification address assignment component 110may be configured such that private keys may be stored within computingplatform(s) 104. For example, the first private key may be stored withina computing platform 104 and/or other locations associated with thefirst individual. In accordance with some implementation, a private keymay be stored in one or more of a “verify.dat” file, a SIM card, and/orother locations.

In some implementations, verification address assignment component 110may be configured such that multiple verification addresses may beassigned to separate individuals. For example, in addition to the firstverification address, a second verification address may be assigned tothe first individual. One or more additional verification addresses maybe assigned to the first individual, in accordance with one or moreimplementations.

The address recordation component 112 may be configured to recordidentifiers and biometric data associated with the individuals atcorresponding verification addresses. For example, the first identifierand first biometric data associated with the first individual may berecorded at the first verification address. Recording information at agiven verification address may include recording a hash or otherencrypted representation of the information. In some implementations,different biometric data may be recorded at multiple verificationaddresses assigned to a single given individual. For example, inaddition to the first identifier and the first biometric data associatedwith the first individual being recorded at the first verificationaddress, the first identifier and second biometric data associated withthe first individual may be recorded at a second verification address.

Generally speaking, biometric data may include metrics related to humancharacteristics. Biometric identifiers are distinctive, measurablecharacteristics that can be used to label and describe individuals.Biometric identifiers are typically include physiologicalcharacteristics, but may also include behavioral characteristics and/orother characteristics. Physiological characteristics may be related tothe shape of an individual's body. Examples of physiologicalcharacteristics used as biometric data may include one or more offingerprint, palm veins, face recognition, DNA, palm print, handgeometry, iris recognition, retina, odor or scent, and/or otherphysiological characteristics. Behavioral characteristics may be relatedto a pattern of behavior of an individual. Examples of behavioralcharacteristics used as biometric data may include one or more of typingrhythm, gait, voice, and/or other behavioral characteristics.

The biometric data may include one or more of an image or other visualrepresentation of a physiological characteristic, a recording of abehavioral characteristic, a template of a physiological characteristicand/or behavioral characteristic, and/or other biometric data. Atemplate may include a synthesis of relevant features extracted from thesource. A template may include one or more of a vector describingfeatures of a physiological characteristic and/or behavioralcharacteristic, a numerical representation of a physiologicalcharacteristic and/or behavioral characteristic, an image withparticular properties, and/or other information.

Biometric data may be received via computing platforms 104 associatedwith the individuals. For example, biometric data associated with afirst individual may be received via a first computing platform 104associated with the first individual. The first computing platform 104may include an input device (not depicted) configured to capture and/orrecord a physiological characteristic and/or behavioral characteristicof the first individual. Examples of such an input device may includeone or more of a camera and/or other imaging device, a fingerprintscanner, a microphone, an accelerometer, and/or other input devices.

The user interface component 114 may be configured to provide aninterface for presentation to individuals via associated computingplatforms 104. The interface may include a graphical user interfacepresented via individual computing platforms 104. According to someimplementations, the interface may be configured to allow a givenindividual to add or delete verification addresses assigned to the givenindividual so long as at least one verification address is assigned tothe given individual.

In some implementations, user interface component 114 may be configuredto access and/or manage one or more user profiles and/or userinformation associated with users of system 100. The one or more userprofiles and/or user information may include information stored byserver(s) 102, one or more of the computing platform(s) 104, and/orother storage locations. The user profiles may include, for example,information identifying users (e.g., a username or handle, a number, anidentifier, and/or other identifying information), security logininformation (e.g., a login code or password), system accountinformation, subscription information, digital currency accountinformation (e.g., related to currency held in credit for a user),relationship information (e.g., information related to relationshipsbetween users in system 100), system usage information, demographicinformation associated with users, interaction history among users inthe system 100, information stated by users, purchase information ofusers, browsing history of users, a computing platform identificationassociated with a user, a phone number associated with a user, and/orother information related to users.

The machine-readable instructions 106 may be executable to perform blockchain-based multifactor personal identity verification using theverification addresses.

The verification request component 116 may be configured to receive oneor more identifiers in connection with one or more requests to verify anidentity of one or more individuals. For example, the first identifiermay be received in connection with a request to verify an identity ofthe first individual. Requests for identity verification may be providedin connection with and/or related to financial transactions, informationexchanges, and/or other interactions. Requests may be received fromother individuals and/or other third parties.

The information extraction component 118 may be configured to extractthe biometric data associated with the one or more individuals from thecorresponding verification addresses. For example, the first biometricdata associated with the first individual may be extracted from thefirst verification address. Extracting information (e.g., biometricdata) from a verification address may include decrypting information.

According to some implementations, information extraction component 118may be configured such that, responsive to receiving the request toverify the identity of the first individual, a prompt may be provided tothe first individual for biometric data matching the first biometricdata and a private key matching the first private key. The prompt may beconveyed via a computing platform 104 associated with the firstindividual. The prompt may be conveyed via a graphical user interfaceand/or other user interface provided by the computing platform 104associated with the first individual. The prompt may include anindication that is one or more of visual, audible, haptic, and/or otherindications.

In some implementations, information extraction component 118 may beconfigured such that, responsive to receiving the request to verify theidentity of the first individual, a prompt may be provided to acomputing platform 104 associated with the first individual. The promptmay cause the computing platform 104 to automatically provide, toserver(s) 102, biometric data matching the first biometric data and/or aprivate key matching the first private key.

The identity verification component 120 may be configured to verify theidentity of the one or more individuals upon, or in response to,receiving matching biometric data and private keys. For example, thepersonal identity of the first individual may be verified upon receiptof (1) biometric data matching the first biometric data and (2) aprivate key matching the first private key. Verifying the personalidentity of the first individual may include comparing storedinformation with newly received information.

According to some implementations, identity verification component 120may be configured such that the personal identity of the firstindividual may be verified upon receipt of (1) biometric data matchingthe first biometric data or the second biometric data and (2) a privatekey matching the first private key. Such implementations may provideso-called “M-of-N” signatures for identity verification where somesubset of a larger set of identifying information is required.

In some implementations, identity verification component 120 may beconfigured such that the biometric data matching the first biometricdata and the private key matching the first private key may be used tosign the verification of the personal identity of the first individual.

A cryptographic signature is a mathematical mechanism that allowssomeone to prove ownership. In the case of Bitcoin, a Bitcoin wallet andits private key(s) are linked by some mathematical magic. When yourBitcoin software signs a transaction with the appropriate private key,the whole network can see that the signature matches the bitcoins beingspent. However, there is no way for the world to guess your private keyto steal your hard-earned bitcoins.

In some implementations, at least one dedicated node performs thesigning of the verification of the personal identity of the firstindividual. A given dedicated node may include one or more of theserver(s) 102. The given dedicated node may be a public node or aprivate node configured for creating new blocks and/or for signingverification.

In some implementations, server(s) 102, computing platform(s) 104,and/or external resources 122 may be operatively linked via one or moreelectronic communication links. For example, such electroniccommunication links may be established, at least in part, via a networksuch as the Internet and/or other networks. It will be appreciated thatthis is not intended to be limiting, and that the scope of thisdisclosure includes implementations in which server(s) 102, computingplatform(s) 104, and/or external resources 122 may be operatively linkedvia some other communication media.

A given computing platform 104 may include one or more processorsconfigured to execute machine-readable instructions. Themachine-readable instructions may be configured to enable an expert oruser associated with the given computing platform 104 to interface withsystem 100 and/or external resources 122, and/or provide otherfunctionality attributed herein to computing platform(s) 104. By way ofnon-limiting example, the given computing platform 104 may include oneor more of a desktop computer, a laptop computer, a handheld computer, atablet computing platform, a NetBook, a Smartphone, a gaming console,and/or other computing platforms.

External resources 122 may include sources of information, hosts and/orproviders of virtual environments outside of system 100, externalentities participating with system 100, and/or other resources. In someimplementations, some or all of the functionality attributed herein toexternal resources 100 may be provided by resources included in system100.

Server(s) 102 may include electronic storage 124, one or more processors126, and/or other components. Server(s) 102 may include communicationlines, or ports to enable the exchange of information with a networkand/or other computing platforms. Illustration of server(s) 102 in FIG.1 is not intended to be limiting. Server(s) 102 may include a pluralityof hardware, software, and/or firmware components operating together toprovide the functionality attributed herein to server(s) 102. Forexample, server(s) 102 may be implemented by a cloud of computingplatforms operating together as server(s) 102.

Electronic storage 124 may comprise non-transitory storage media thatelectronically stores information. The electronic storage media ofelectronic storage 124 may include one or both of system storage that isprovided integrally (i.e., substantially non-removable) with server(s)102 and/or removable storage that is removably connectable to server(s)102 via, for example, a port (e.g., a USB port, a firewire port, etc.)or a drive (e.g., a disk drive, etc.). Electronic storage 124 mayinclude one or more of optically readable storage media (e.g., opticaldisks, etc.), magnetically readable storage media (e.g., magnetic tape,magnetic hard drive, floppy drive, etc.), electrical charge-basedstorage media (e.g., EEPROM, RAM, etc.), solid-state storage media(e.g., flash drive, etc.), and/or other electronically readable storagemedia. Electronic storage 124 may include one or more virtual storageresources (e.g., cloud storage, a virtual private network, and/or othervirtual storage resources). Electronic storage 124 may store softwarealgorithms, information determined by processor(s) 126, informationreceived from server(s) 102, information received from computingplatform(s) 104, and/or other information that enables server(s) 102 tofunction as described herein.

Processor(s) 126 may be configured to provide information processingcapabilities in server(s) 102. As such, processor(s) 126 may include oneor more of a digital processor, an analog processor, a digital circuitdesigned to process information, an analog circuit designed to processinformation, a state machine, and/or other mechanisms for electronicallyprocessing information. Although processor(s) 126 is shown in FIG. 1 asa single entity, this is for illustrative purposes only. In someimplementations, processor(s) 126 may include a plurality of processingunits. These processing units may be physically located within the samedevice, or processor(s) 126 may represent processing functionality of aplurality of devices operating in coordination. The processor(s) 126 maybe configured to execute machine-readable instruction components 108,110, 112, 114, 116, 118, 120, and/or other machine-readable instructioncomponents. Processor(s) 126 may be configured to executemachine-readable instruction components 108, 110, 112, 114, 116, 118,120, and/or other machine-readable instruction components by software;hardware; firmware; some combination of software, hardware, and/orfirmware; and/or other mechanisms for configuring processingcapabilities on processor(s) 126. As used herein, the term“machine-readable instruction component” may refer to any component orset of components that perform the functionality attributed to themachine-readable instruction component. This may include one or morephysical processors during execution of processor readable instructions,the processor readable instructions, circuitry, hardware, storage media,or any other components.

It should be appreciated that although machine-readable instructioncomponents 108, 110, 112, 114, 116, 118, and 120 are illustrated in FIG.1 as being implemented within a single processing unit, inimplementations in which processor(s) 126 includes multiple processingunits, one or more of machine-readable instruction components 108, 110,112, 114, 116, 118, and/or 120 may be implemented remotely from theother machine-readable instruction components. The description of thefunctionality provided by the different machine-readable instructioncomponents 108, 110, 112, 114, 116, 118, and/or 120 described below isfor illustrative purposes, and is not intended to be limiting, as any ofmachine-readable instruction components 108, 110, 112, 114, 116, 118,and/or 120 may provide more or less functionality than is described. Forexample, one or more of machine-readable instruction components 108,110, 112, 114, 116, 118, and/or 120 may be eliminated, and some or allof its functionality may be provided by other ones of machine-readableinstruction components 108, 110, 112, 114, 116, 118, and/or 120. Asanother example, processor(s) 126 may be configured to execute one ormore additional machine-readable instruction components that may performsome or all of the functionality attributed below to one ofmachine-readable instruction components 108, 110, 112, 114, 116, 118,and/or 120.

FIG. 2 illustrates a method 200 for establishing verification addresseson a block chain in order to provide block chain-based multifactorpersonal identity verification, in accordance with one or moreimplementations. The operations of method 200 presented below areintended to be illustrative. In some implementations, method 200 may beaccomplished with one or more additional operations not described,and/or without one or more of the operations discussed. Additionally,the order in which the operations of method 200 are illustrated in FIG.2 and described below is not intended to be limiting.

In some implementations, one or more operations of method 200 may beimplemented in one or more processing devices (e.g., a digitalprocessor, an analog processor, a digital circuit designed to processinformation, an analog circuit designed to process information, a statemachine, and/or other mechanisms for electronically processinginformation). The one or more processing devices may include one or moredevices executing some or all of the operations of method 200 inresponse to instructions stored electronically on an electronic storagemedium. The one or more processing devices may include one or moredevices configured through hardware, firmware, and/or software to bespecifically designed for execution of one or more of the operations ofmethod 200.

At an operation 202, identifiers may be associated with individualshaving previously verified personal identities. A first identifier maybe associated a first individual. The first individual may have apreviously verified personal identity. Operation 202 may be performed byone or more hardware processors configured to execute a machine-readableinstruction component that is the same as or similar to individualidentifier component 108 (as described in connection with FIG. 1), inaccordance with one or more implementations.

At an operation 204, verification addresses on a block chain may beassigned to the individuals. A given verification address may include apublic key and a private key. A first verification address may beassigned to the first individual. The first verification address mayinclude a first public key and a first private key. Operation 204 may beperformed by one or more hardware processors configured to execute amachine-readable instruction component that is the same as or similar toverification address assignment component 110 (as described inconnection with FIG. 1), in accordance with one or more implementations.

At an operation 206, identifiers and biometric data associated with theindividuals may be recorded at corresponding verification addresses. Thefirst identifier and first biometric data associated with the firstindividual may be recorded at the first verification address. Theidentity of the one or more individuals may be verifiable upon, or inresponse to, receiving matching biometric data and private keys. Thepersonal identity of the first individual may be verifiable upon, or inresponse to, receipt of (1) biometric data matching the first biometricdata and (2) a private key matching the first private key. Operation 206may be performed by one or more hardware processors configured toexecute a machine-readable instruction component that is the same as orsimilar to address recordation component 112 (as described in connectionwith FIG. 1), in accordance with one or more implementations.

FIG. 3 illustrates a method 300 for performing block chain-basedmultifactor personal identity verification using verification addresses,in accordance with one or more implementations. The operations of method300 presented below are intended to be illustrative. In someimplementations, method 300 may be accomplished with one or moreadditional operations not described, and/or without one or more of theoperations discussed. Additionally, the order in which the operations ofmethod 300 are illustrated in FIG. 3 and described below is not intendedto be limiting.

In some implementations, method 300 may be implemented in one or moreprocessing devices (e.g., a digital processor, an analog processor, adigital circuit designed to process information, an analog circuitdesigned to process information, a state machine, and/or othermechanisms for electronically processing information). The one or moreprocessing devices may include one or more devices executing some or allof the operations of method 300 in response to instructions storedelectronically on an electronic storage medium. The one or moreprocessing devices may include one or more devices configured throughhardware, firmware, and/or software to be specifically designed forexecution of one or more of the operations of method 300.

At an operation 302, one or more identifiers may be received inconnection with one or more requests to verify an identity of one ormore individuals. A first identifier may be received in connection witha request to verify an identity of a first individual. Operation 302 maybe performed by one or more hardware processors configured to execute amachine-readable instruction component that is the same as or similar toverification request component 116 (as described in connection with FIG.1), in accordance with one or more implementations.

At an operation 304, biometric data associated with the one or moreindividuals may be extracted from corresponding verification addresseson a block chain. A given verification address may include a public keyand a private key. First biometric data associated with the firstindividual may extracted from a first verification address assigned tothe first individual. The first verification address may include a firstpublic key and a first private key. Operation 304 may be performed byone or more hardware processors configured to execute a machine-readableinstruction component that is the same as or similar to informationextraction component 118 (as described in connection with FIG. 1), inaccordance with one or more implementations.

At an operation 306, the identity of the one or more individuals may beverified upon, or in response to, receiving matching biometric data andprivate keys. The personal identity of the first individual may beverified upon, or in response to, receipt of (1) biometric data matchingthe first biometric data and (2) a private key matching the firstprivate key. Operation 306 may be performed by one or more hardwareprocessors configured to execute a machine-readable instructioncomponent that is the same as or similar to identity verificationcomponent 120 (as described in connection with FIG. 1), in accordancewith one or more implementations.

Exemplary implementations may facilitate storing personal data on theblock chain. The personal data may be stored on the block chain in anencrypted way. A person may be identified at the block chain level withone or more of a private key, a finger print, a finger print hash, aneye retina, an eye retina hash, and/or other unique information. Thedata stored may include or relate to one or more of a passport, anidentification card, extracted passport information, a driver's license,extracted driver's license information, finger print, eye retina, and/orother information. According to some implementations, if some of thedata is changed, a new record may be created for that person in theblock chain. That is, all changes are added as new records. The oldrecord will always be stored on the block chain. Generally speaking, allrecords on the block chain are stored forever and cannot be removed.More than one copy of the block chain will exist to ensure the recordsare not manipulated.

Exemplary implementations may facilitate access to personal data. Theremay be multiple access levels for the personal data in the block chain.Access controls may be grated on public/private key pairs levels.Examples of access levels may include one or more of Super Admin (fullaccess to block chain), Authorities-country level (full read-onlyaccess), Authorities-state/local level (limited read-only access),Police and other services including Emergency (access to certainpersonal data by Finger Print/Eye retina of that person only),Participating Merchants (limited access), and/or other access levels.

Exemplary implementations may facilitate verification check. There maybe multiple levels for how it is possible to check verification. Forexample, some implementations may ensure a person has a record at“Company” but no personal data is provided. Some implementations mayensure a person has a record at Company and get very basic personalinformation such as Full Name, DOB, Gender, and/or other basicinformation. Some implementations may ensure a person has a record atCompany and get all personal data.

Although the present technology has been described in detail for thepurpose of illustration based on what is currently considered to be themost practical and preferred implementations, it is to be understoodthat such detail is solely for that purpose and that the technology isnot limited to the disclosed implementations, but, on the contrary, isintended to cover modifications and equivalent arrangements that arewithin the spirit and scope of the appended claims. For example, it isto be understood that the present technology contemplates that, to theextent possible, one or more features of any implementation can becombined with one or more features of any other implementation.

What is claimed is:
 1. A system for providing block chain-basedmultifactor personal identity verification, the system comprising: oneor more hardware processors configured by machine-readable instructionsto: (a) establish verification addresses on a block chain by: (i)associating identifiers with individuals having previously verifiedpersonal identities, a first identifier being associated with a firstindividual, the first individual having a first previously verifiedpersonal identity; (ii) assigning verification addresses on a blockchain to the individuals having previously verified personal identities,a given verification address including a public key and a private key, afirst verification address being assigned to the first individual, thefirst verification address including a first public key and a firstprivate key; and (iii) recording identifiers including unique dataassociated with the individuals at corresponding verification addresses,the first identifier including the first unique data associated with thefirst individual being recorded at the first verification address; (b)perform block chain-based multifactor personal identity verificationusing the verification addresses by: (i) receiving one or moreidentifiers in connection with one or more requests to verify anidentity of one or more individuals, the first identifier being receivedin connection with a request to verify an identity of the firstindividual; (ii) obtaining the identifiers including the unique dataassociated with the one or more individuals from the correspondingverification addresses, the first identifier including the unique dataassociated with the first individual being obtained from the firstverification address; and (iii) verifying the identity of the one ormore individuals upon receiving matching identifiers with the uniquedata and receiving matching private keys, the personal identity of thefirst individual, having the first previously verified identity, beingverified upon receipt of an identifier with unique data matching thefirst identifier with the first unique data recorded at the firstverification address and a private key matching the first private key.2. The system of claim 1, wherein the one or more hardware processorsare also configured by machine-readable instructions such that verifyingthe personal identity of the first individual is performed by signing averification transaction on the block chain.
 3. The system of claim 2,wherein the one or more hardware processors are also configured bymachine-readable instructions such that the verification transaction issigned by a public node or a private node.
 4. The system of claim 1,wherein the one or more hardware processors are also configured bymachine-readable instructions to: add or delete established verificationaddresses on the block chain by providing an interface for presentationto individuals via associated computing platforms, the interface beingconfigured to allow a given individual to add or delete verificationaddresses assigned to the given individual so long as at least oneverification address is assigned to the given individual.
 5. The systemof claim 1, wherein the computer system is caused to: sign, using theprivate key from which the verification address was derived, theverification of the individual's identity responsive to thedetermination that the identifier of the request including the uniquedata of the request match the first identifier including the firstunique data.
 6. The system of claim 5, wherein the computer system iscaused to: store, at the one or more computer-readable storage media,the private key in association with the verification address associatedwith the block chain; obtain, from the user device or devices, theprivate key in connection with the request to verify the individual'sidentity; obtain the first private key using the verification addressindicated in the request; and sign, using the private key, theverification of the individual's identity responsive to a determinationthat the identifier of the request including the unique data of therequest, and the private key of the request match the stored firstidentifier including the stored first unique data, and the stored firstprivate key.
 7. The system of claim 6, wherein the private key is alsostored on a client-side device, and wherein the client-side device is auser device of the individual.
 8. The system of claim 1, wherein theunique data relates to biometric information of the individual.
 9. Thesystem of claim 1, wherein the first unique data relates to firstbiometric information of the first individual and is stored on the blockchain at the first verification address.
 10. The system of claim 1,wherein the unique data is one of an image, a recording, or a templateand/or biometric information is related to a fingerprint, palm veins,face recognition, DNA, palm print, hand geometry, iris recognition,retina, odor, gait, voice, a fingerprint hash or an eye retina hash. 11.The system of claim 1, wherein the unique data relates to one of apassport, extracted passport information, an identification card,extracted identification card information, a driver's license, andextracted driver's license information.
 12. The system of claim 10,wherein the unique data is stored on the block chain at the verificationaddress and is different from the private key.
 13. The system of claim11, wherein the unique data is stored on the block chain at theverification address and is different from the private key.
 14. Thesystem of claim 1, wherein the computer system is caused to: provide afirst user, different than the individual, access to data stored at theone or more computer-readable storage media in association with theverification address associated with the block chain, the first userbeing provided access to the stored data based on verification that thefirst user has a first private key, the first private key beingdifferent the private key from which the verification address wasderived; and denying a second user, different than the individual,access to the stored data based on verification that the second user hasa second private key.
 15. The system of claim 1, wherein the unique dataand the identifier are different from each other.
 16. The system ofclaim 1, wherein the computer system includes a server-side computer.17. The system of claim 1, wherein the computer system is caused to:assign another verification address associated with the block chain tothe individual; store, at the one or more computer-readable storagemedia, additional unique data of the individual in association with theother verification address associated with the block chain, theadditional unique data being information related to biometric data ofthe individual; obtain, from the client-side device, the additionalunique data in connection with the request to verify the individual'sidentity, the request further indicating the other verification addressassociated with the block chain; obtain the stored additional uniqueinformation using the other verification address indicated in therequest; and sign the verification of the individual's identityresponsive to a determination that the identifier of the request, theunique data of the request, and the additional unique data of therequest match the stored identifier, the stored unique data, and thestored additional unique data, wherein the additional unique data isdifferent from the unique data.
 18. The system of claim 17, wherein theserver-side computer system is caused to: obtain, via a user interface,a user-initiated command to add the other verification address as anaddress of the block chain for the individual; and assign the otherverification address associated with the block chain to the individualbased on the user-initiated command.
 19. The system of claim 17, whereinthe computer system is caused to: obtain, via a user interface, auser-initiated command to remove the other verification address as anaddress of the block chain for the individual; and de-associate theother verification address associated with the block chain from theindividual based on the user-initiated command.
 20. The system of claim1, wherein the computer system is caused to store the unique data in anencrypted form as a hash of information.
 21. The system of claim 1,wherein the computer system is caused to store the unique data on theblock chain in a block as a new transaction.
 22. The system of claim 1,wherein the computer system is caused to store the unique data as atemplate or vector of information relating to the individual.
 23. Thesystem of claim 1, wherein the computer system is caused to enable auser to create a new record on the block chain containing changes to theunique data.
 24. The system of claim 1, wherein the computer system iscaused to, in verifying identity, require M-of-N signatures for identityverification.
 25. The system of claim 1, wherein the computer system iscaused to provide access to personal data of the first individual whoseidentity is verified.
 26. The system of claim 25, wherein the computersystem is caused to enable multiple levels of access to the personaldata of the first individual whose identity is verified.
 27. The systemof claim 25, wherein the computer system is caused to provide access tothe personal data of the first individual whose identity is verified bya merchant.