Distributed identity system with local identification

ABSTRACT

A distributed identity system with local identification includes an identity system device and at least one local electronic device. The local electronic device locally stores at least a portion of identity information and the biometric identification information stored by the identity system device. The local electronic device determines identities by comparing received digital representations of biometrics with locally stored biometric identification information, performs actions using locally stored identity information included in the local copy, and uploads data related to the actions to the identity system device upon occurrence of an upload condition.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a continuation patent application of U.S. patentapplication Ser. No. 16/679,551, filed Nov. 11, 2019 and titled“Distributed Identity System with Local Identification,” which is anonprovisional patent application of and claims the benefit of U.S.Provisional Patent Application No. 62/785,723, filed Dec. 28, 2018 andtitled “Distributed Identity System with Local Identification,” thedisclosures of which are hereby incorporated herein by reference intheir entireties.

FIELD

The described embodiments relate generally to identity systems. Moreparticularly, the present embodiments relate to distributed identitysystems with local identification.

BACKGROUND

Various electronic devices may use identity information for people toperform a number of different actions. Identity information may includea name, an address, entitlements (such as purchased tickets), financialinformation, and/or any other information associated with a person'sidentity. For example, a security kiosk may access identity informationto determine a person's name as part of screening the person for entryinto a secured area, such as an airport. Such electronic devices mayprotect the identity information to restrict use of the identityinformation. For example, an electronic device may require login to anaccount associated with the identity information prior to taking anyaction that uses the identity information.

In some situations, the identity information may be maintained andstored at the electronic device that uses the identity information. Thisenables the electronic device to perform actions using the identityinformation. In other situations, a central system maintains and storesthe identity information and allows access to remote electronic devices.This enables multiple electronic devices to perform actions using theidentity information.

SUMMARY

The present disclosure relates to a distributed identity system withlocal identification. The distributed identity system includes anidentity system device and at least one local electronic device. Thelocal electronic device locally stores at least a portion of identityinformation and the biometric identification information stored by theidentity system device. The local electronic device determinesidentities by comparing received digital representations of biometricswith locally stored biometric identification information, performsactions using locally stored identity information included in the localcopy, and uploads data related to the actions to the identity systemdevice upon occurrence of an upload condition.

In various embodiments, a distributed identity system with localidentification includes an identity system device that stores identityinformation and biometric identification information and a localelectronic device. The local electronic device stores a local copy of atleast a portion of the identity information and the biometricidentification information, determines identities by comparing receiveddigital representations of biometrics with the biometric identificationinformation included in the local copy, performs actions using theidentity information included in the local copy that corresponds to theidentities; and uploads data related to the actions to the identitysystem device upon occurrence of an upload condition.

In some examples, the upload condition is at least one of elapse of atime period, completion of an event, an upload request received by thelocal electronic device from the identity system device, the datareaching a threshold size, or completion of a flight. In variousexamples, the identity system device determines an update to the localcopy and transmits the update to the local electronic device. In someexamples, the local electronic device is operative to change the uploadcondition.

In various examples, at least part of the identity information isencrypted using an encryption key and the encryption key is stored bythe identity system device and the local electronic device. In someimplementations of such examples, the local electronic device isoperative to delete the encryption key stored by the local electronicdevice. In some such implementations, the local electronic devicedeletes the encryption key in response to an instruction received fromthe identity system device.

In some embodiments, an electronic device in a distributed identitysystem with local identification includes a non-transitory storagemedium that stores instructions, a biometric reader device, acommunication unit, and a processor. The processor executes theinstructions to receive a local store, from an identity system deviceusing the communication unit, that includes at least a portion ofidentity information and biometric identification information stored bythe identity system device; determine identities by comparing digitalrepresentations of biometrics, received via the biometric reader device,with the biometric identification information included in the localstore; perform actions using the identity information included in thelocal store that corresponds to the identities; and upload data relatedto the actions to the identity system device using the communicationunit upon occurrence of an upload condition.

In various examples, the actions include allowing entrance based on aticket and the processor updates a status of the ticket in the localstore based on the entrance. In some examples, the identity informationincludes a verified age. In various examples, the identity informationincludes payment information.

In some examples, the electronic device further includes an accesscontrol mechanism and the actions include the processor controllingaccess by operating the access control mechanism. In various examples,the digital representations of the biometrics include a digitalrepresentation of at least one of a fingerprint, a voiceprint, a facialimage, a retina image, an iris image, or a gait. In some examples, thebiometric reader device includes at least one of a fingerprint scanner,an optical fingerprint scanner, a phosphorescent fingerprint scanner, acamera, an image sensor, or a microphone.

In various embodiments, an electronic device in a distributed identitysystem with local identification includes a non-transitory storagemedium, a communication unit, and a processor. The non-transitorystorage medium stores instructions, identity information, and biometricidentification information. The processor executes the instructions todetermine at least a portion of the identity information and thebiometric identification information to store at a local electronicdevice; transmit the portion of the identity information and thebiometric identification information to the local electronic deviceusing the communication unit; after occurrence of an upload condition,receive data from the local electronic device using the communicationunit, the data related to actions performed by the local electronicdevice using identity information included in the portion of theidentity information and the biometric identification information thatcorresponds to identities determined by the local electronic device as aresult of comparing received digital representations of biometrics tothe biometric identification information included in the portion of theidentity information and the biometric identification information; andprocess the data to update the identity information.

In some examples, the local electronic device is a component of anaircraft and the processor determines the at least the portion of theidentity information and the biometric identification information tostore at the local electronic device by selecting the identityinformation and the biometric identification information thatcorresponds to a flight manifest for the aircraft. In various examples,the local electronic device is a ticketing device for an event and theprocessor determines the at least the portion of the identityinformation and the biometric identification information to store at thelocal electronic device by selecting the identity information and thebiometric identification information that corresponds to ticket holdersfor the event. In some examples, the local electronic device is acomponent of a vehicle and the processor determines the at least theportion of the identity information and the biometric identificationinformation to store at the local electronic device by selecting theidentity information and the biometric identification information thatcorresponds to permitted operators of the vehicle. In various examples,the local electronic device is a component of a secured area and theprocessor determines the at least the portion of the identityinformation and the biometric identification information to store at thelocal electronic device by selecting the identity information and thebiometric identification information that corresponds to permittedentrants to the secured area.

In some examples, the local electronic device is a first localelectronic device, the portion of the identity information and thebiometric identification is a first portion of the portion of theidentity information and the biometric identification, the uploadcondition is a first upload condition, the data is first data, theactions are first actions, the identities are first identities, and thereceived digital representations of the biometrics are first receiveddigital representations of biometrics. In such examples, the processoris operative to determine at least a second portion of the identityinformation and the biometric identification information to store at asecond local electronic device; transmit the second portion of theidentity information and the biometric identification information to thesecond local electronic device using the communication unit; afteroccurrence of a second upload condition, receive second data from thesecond local electronic device using the communication unit, the seconddata related to second actions performed by the second local electronicdevice using identity information included in the second portion of theidentity information and the biometric identification information thatcorresponds to second identities determined by the second localelectronic device as a result of comparing second received digitalrepresentations of biometrics to the biometric identificationinformation included in the second portion of the identity informationand the biometric identification information; and process the seconddata to update the identity information.

BRIEF DESCRIPTION OF THE DRAWINGS

The disclosure will be readily understood by the following detaileddescription in conjunction with the accompanying drawings, wherein likereference numerals designate like structural elements.

FIG. 1 depicts a first example distributed identity system with localidentification.

FIG. 2 depicts a second example distributed identity system with localidentification.

FIG. 3 depicts a flow chart illustrating a first example method foroperating a distributed identity system with local identification. Thismethod may be performed by the systems of FIGS. 1 and/or 2 .

FIG. 4 depicts a flow chart illustrating a second example method foroperating a distributed identity system with local identification. Thismethod may be performed by the systems of FIGS. 1 and/or 2 .

FIG. 5 depicts a flow chart illustrating a third example method foroperating a distributed identity system with local identification. Thismethod may be performed by the systems of FIGS. 1 and/or 2 .

FIG. 6 depicts a flow chart illustrating a fourth example method foroperating a distributed identity system with local identification. Thismethod may be performed by the systems of FIGS. 1 and/or 2 .

FIG. 7 depicts a third example distributed identity system with localidentification.

FIG. 8 depicts a flow chart illustrating a fifth example method foroperating a distributed identity system with local identification. Thismethod may be performed by the systems of FIGS. 2 and/or 7 .

FIG. 9 depicts a fourth example distributed identity system with localidentification.

FIG. 10 depicts a flow chart illustrating a sixth example method foroperating a distributed identity system with local identification. Thismethod may be performed by the systems of FIGS. 2 and/or 9 .

FIG. 11 depicts a fifth example distributed identity system with localidentification.

FIG. 12 depicts a flow chart illustrating a seventh example method foroperating a distributed identity system with local identification. Thismethod may be performed by the systems of FIGS. 2 and/or 11 .

FIG. 13 depicts a sixth example distributed identity system with localidentification.

FIG. 14 depicts a flow chart illustrating an eighth example method foroperating a distributed identity system with local identification. Thismethod may be performed by the systems of FIGS. 2 and/or 13 .

DETAILED DESCRIPTION

Reference will now be made in detail to representative embodimentsillustrated in the accompanying drawings. It should be understood thatthe following descriptions are not intended to limit the embodiments toone preferred embodiment. To the contrary, it is intended to coveralternatives, modifications, and equivalents as can be included withinthe spirit and scope of the described embodiments as defined by theappended claims.

The description that follows includes sample systems, methods, andcomputer program products that embody various elements of the presentdisclosure. However, it should be understood that the describeddisclosure may be practiced in a variety of forms in addition to thosedescribed herein.

Implementations where an electronic device maintains and stores identityinformation may not be very flexible as such implementations do notsupport multiple electronic devices using the identity information,particularly different kinds of electronic devices. Further, eachelectronic device may be configured with the identity information beforeuse. This may be burdensome and complex, as well as multiplying storagerequirements for the identity information. Each time a new electronicdevice is to use the identity information, the new electronic device isseparately configured to use the identity information.

Implementations where a central system maintains and stores the identityinformation may support use of the identity information by multipleelectronic devices and/or different kinds of electronic devices. Thismay be very flexible as new electronic devices communicate with thecentral system for identity information rather than requiring a separateidentity information configuration. However, electronic devices in suchan arrangement may be unable to function if a communication link betweenthe electronic device and the central system becomes unavailable.Further, the speed at which the electronic device operates may bedependent on the speed at which the electronic device may communicatewith the central system.

The following disclosure relates to a distributed identity system withlocal identification. The distributed identity system includes anidentity system device and at least one local electronic device. Thelocal electronic device locally stores at least a portion of identityinformation and the biometric identification information stored by theidentity system device. The local electronic device determinesidentities by comparing received digital representations of biometricswith locally stored biometric identification information, performsactions using locally stored identity information included in the localcopy, and uploads data related to the actions to the identity systemdevice upon occurrence of an upload condition. In this way, the systemperforms identifications locally without requiring communication betweencomponents of the system but also uses the system to centrally store andmaintain the identity information and the identification informationthat is used to protect the identity information.

The above may allow local electronic devices to function even whencommunication between components of the system is unavailable. This mayalso allow local use of centrally maintained information, free up thelocal electronic devices from separately maintaining and storing theinformation, improve the speed of system and/or local electronic deviceperformance by making the performance independent of the speed ofcommunication between components of the system, improve the speed ofsystem and/or local electronic device performance by reducing networkcommunication traffic though communicating updates upon the occurrenceof the upload condition rather than constantly communicating updates,and so on. This may also enable the local electronic devices to performfunctions not previously performable as the identity information may beupdated based on actions performed by other electronic devices thataffect the identity information.

These and other embodiments are discussed below with reference to FIGS.1-14 . However, those skilled in the art will readily appreciate thatthe detailed description given herein with respect to these Figures isfor explanatory purposes only and should not be construed as limiting.

FIG. 1 depicts a first example distributed identity system 100 withlocal identification. The distributed identity system 100 may includeone or more identity system devices 101 (which may be located at one ormore centralized or first locations 104) and one or more localelectronic devices 102A-D (which may be located at one or more remote oradditional locations 105A-D). The identity system device 101 may storeand maintain identity information (e.g., information about a person suchas name, address, financial information, social security number, phonenumber, previous actions by a person, and so on) and identificationinformation (i.e., information that may be used to determine theidentity of a person). The local electronic devices 102A-D may store alocal copy (or local store) of a portion of the identity information andpart of the identification information obtained from the identity systemdevice 101 (such as pushed from the identity system device 101,requested from the identity system device 101 by the respective localelectronic device 102A-D, and so on). The local electronic devices102A-D may respectively receive user input from a person 103A-D,determine an identity for the person 103A-D by comparing the user inputto stored identification information in the local copy (or local store,as compared to that stored by the identity system device 101 being themain copy or main store), perform one or more actions using informationin stored identity information in the local copy (or local store) thatis associated with the identity of the person 103A-D, and upload dataregarding any actions performed to the identity system device 101 uponoccurrence of an upload condition (such as elapse of a time period,completion of an event, receipt of an upload request, data to uploadreaching a threshold size, completion of a flight, and so on). Theidentity system device 101 may process the data to update the identityinformation. In this way, the local electronic devices 102A-D may beable to perform identifications locally without requiring communicationwith the identity system device 101. At the same time, the distributedidentity system 100 may use the identity system device 101 to centrallystore and maintain the identity information and the identificationinformation and share and coordinate data between the local electronicdevices 102A-D. The local electronic devices 102A-D uploading data uponoccurrence of the upload condition may minimize communication networktraffic and conserve available communication network bandwidth in thedistributed identity system 100.

These features may allow the local electronic devices 102A-D to functioneven when communication between the local electronic devices 102A-D andthe identity system device 101 is unavailable. This may also allow localuse of centrally maintained information, free up the local electronicdevices 102A-D from separately maintaining and storing the information,improve the performance speed of local electronic devices 102A-D bymaking the performance independent of the speed of communication betweenlocal electronic devices 102A-D and the identity system device 101,minimize communication network traffic, conserve available communicationnetwork bandwidth, and so on. This may also enable the local electronicdevices 102A-D to perform functions not previously performable as theidentity information may be updated based on actions performed by otherlocal electronic devices 102A-D that affect the identity information.

In some implementations, one or more portions of the identityinformation and/or the identification information (whether stored by theidentity system device 101 and/or in the local copy (or local store)stored by the local electronic devices 102A-D) may be encrypted usingone or more encryption keys (such as symmetric encryption keys and soon). The identity system device 101 and/or the local electronic devices102A-D may each store copies of the encryption key such that they candecrypt, encrypt, and/or use the identity information and/or theidentification information. At the same time, the encrypted identityinformation and/or the identification information may be useless outsideof the distributed identity system 100 even if obtained and theencrypted identity information and/or the identification information maybe functionally deleted by deleting the encryption key.

The identity information may include a name, an address, entitlements(such as purchased tickets), financial information, and/or any otherinformation associated with a person's identity. For example, the localelectronic device 102A-D may be a security kiosk that may accessidentity information to determine a person's name as part of screeningthe person for entry into a secured area, such as an event venue, abuilding, an airport, and so on. By way of another example, the localelectronic device 102A-D may be a point of sale device that may accessidentity information to determine a person's financial information aspart of processing payment for a transaction. In yet another example,the local electronic device 102A-D may be a ticket processing station atan event venue that may access identity information to determine whetheror not a person has a valid ticket for entrance. In still anotherexample, the local electronic device 102A-D may be an age verificationdevice that may access identity information to determine whether or nota person is of a threshold age, such as eighteen or twenty one. Variousconfigurations are possible and contemplated without departing from thescope of the present disclosure.

By allowing use of identity information upon receipt of user input thatmatches associated identification information, the distributed identitysystem 100 may protect the identity information by restricting access tothe identity information. For example, the local electronic device102A-D may include a biometric reader device (such as a fingerprintscanner, a camera and/or other 2D or 3D image capture device, amicrophone, a heart rhythm monitor or other biological sensor, and soon) that is operable to obtain or receive a digital representation of abiometric (such as one or more hashes or other digital representationsof one or more fingerprints, facial images, iris images, retina images,voiceprints, gaits, heart rhythms or other biological information, andso on) from the person 103A-D and the stored identification informationin the local copy (or local store) may include biometric data associatedwith identities corresponding to the stored identity information in thelocal copy. By way of another example, the local electronic device102A-D may include one or more keyboards, touch screens, and/or otherinput/output devices and the person 103A-D may use such to provide logininformation for an account and the stored identification information inthe local copy may include account information. Various configurationsare possible and contemplated without departing from the scope of thepresent disclosure.

The identity information and the identification information stored bythe local electronic device 102A-D in the local copy (or local store)may be determined and/or stored in a variety of different ways. In someimplementations, the local electronic device 102A-D and/or the identitysystem device 101 may determine one or more parameters for identities tostore in the local copy, obtain identity information and biometricidentification information that corresponds to the parameters, and storethe obtained identity information and biometric identification in thelocal copy at the local electronic device 102A-D. Such parameters may beassociated with the function of the local electronic device 102A-D, thelocation 104A-D of the local electronic device 102A-D, a time period,and/or other factors. For example, the local electronic device 102A-Dmay be a ticket kiosk at an event venue and the parameters may includepeople who have a valid ticket for the event. By way of another example,the local electronic device 102A-D may be an airport security stationand the parameters may include people who have a flight at that airportand/or that terminal and/or that gate within twenty four hours. In yetanother example, the local electronic device 102A-D may be a point ofsale device on a flight and the parameters may include a flight manifestof people scheduled to be on that flight. By way of another example, thelocal electronic device 102A-D may be a vehicle and the parameters mayinclude a list of people who are permitted to operate the vehicle. Instill another example, the local electronic device 102A-D may be agrocery store checkout device and the parameters may include people whofrequent that particular grocery store. Various configurations arepossible and contemplated without departing from the scope of thepresent disclosure.

One or more identity system devices 101 may use information obtainedfrom one or more local electronic devices 102A-D in a variety ofdifferent ways. For example, in some implementations, local electronicdevices 102A-D may be security screening devices at an airport. Anidentity system device 101 may receive information such as determinedidentity, ticket data (such as flight numbers, gate numbers, terminalnumbers, flight times, and so on) from one or more such securityscreening devices and use such information to perform tasks, such asverifying that an identity is associated with a valid identification(such as a driver's license, passport, and so on), implementing amultiple lane screening system, and so on. For example, the identitysystem device 101 may use the information to adjust personnel and/orother resources to manage expected flow; create expedited lines based onwhich passengers are early, late, and so on; create expedited and/orother adjusted lines for staff as opposed to passengers; createdifferent lines for differently levels of tickets, rewards or otherloyalty programs, and so on; create different lines for different levelsof security (such as routing trusted people to minimized screening linesand riskier people to additional screening lines, and so on); and so on.The identity system device 101 (and/or the local electronic devices102A-D) may use information from one or more local electronic devices102A-D in a variety of different ways to perform various functions thatmight not otherwise be possible without such information.

Additionally, although this example is provided in the context ofairport security, it is understood that this is an example. Suchtechniques may be performed in other contexts (such as in the context ofa stadium or other event venue, vehicle, and so on) without departingfrom the scope of the present disclosure. Various configurations arepossible and contemplated.

Although the above illustrates and describes one or more localelectronic devices 102A-D storing a local copy of information (such asidentity information and/or identification information) and subsequentlyupdating one or more identity system devices 101 regarding any actionsperformed, this an similar examples below are simplified examples forthe purposes of clarity. In various implementations, one or more of thelocal electronic devices 102A-D may be a local network of electronicdevices. For example, a central server computing device at a stadium maystore a local copy of information (such as identity information and/oridentification information) from one or more identity system devices101, provide access to such a local copy of information to one or morestations and/or other electronic devices at the stadium, and then updatethe identity system device 101 for any actions performed by any of thestations and/or other electronic devices at the stadium. By way ofanother example, a server computing device on an aircraft may store alocal copy of information (such as identity information and/oridentification information) from one or more identity system devices101, provide access to such local copy of information to one or morestations and/or other electronic devices at individual passenger seats,and update the identity system device 101 for any actions performed byany of the stations and/or other electronic devices at individualpassenger seats. Various configurations are possible and contemplatedwithout departing from the scope of the present disclosure.

Further, although the above illustrates and describes one or more localelectronic devices 102A-D storing a local copy of information (such asidentity information and/or identification information) and subsequentlyupdating one or more identity system devices 101 regarding any actionsperformed, this an similar examples below are simplified examples forthe purposes of clarity. In various implementations, the identity systemdevice 101 may communicate with one or more third party databases and/orother electronic devices to obtain information to provide in a localcopy to a local electronic device 102A-D and/or to update based on oneor more actions performed by a local electronic device 102A-D. Suchthird party databases and/or other electronic devices may include one ormore black lists (such as a transportation and security administrationno fly list), driver's license databases, criminal watch lists, paymentprocessing systems, and/or any other kind of third party database and/orother electronic device. Various configurations are possible andcontemplated without departing from the scope of the present disclosure.

FIG. 2 depicts a second example distributed identity system 200 withlocal identification. The distributed identity system 200 may includeone or more identity system devices 201 that are operable to communicatewith one or more local electronic devices 202 via one or more wiredand/or wireless communication networks 210.

The identity system device 201 may include one or more processing units211 or other processors or controllers, one or more communication units212, one or more non-transitory storage media 213 (which may take theform of, but is not limited to, a magnetic storage medium; opticalstorage medium; magneto-optical storage medium; read only memory; randomaccess memory; erasable programmable memory; flash memory; and so on),and so on. Similarly, the local electronic device 202 may include one ormore processing units 216 or other processors or controllers,communication units 217, input/output components 218 (such as one ormore keyboards; touch screens; mice; biometric reader devices like afingerprint scanner, an optical fingerprint scanner, a phosphorescentfingerprint scanner, a camera and/or other 2D or 3D image capturedevice, an image sensor, a microphone, a heart rhythm monitor or otherbiological sensor, and/or any other device operative to obtain a digitalrepresentation of a biometric; and so on), non-transitory storage media219, and so on.

The identity system device 201 may store identity information 214A,identification information 214B, and/or one or more encryption keys 215in the storage medium 213. The identity information 214A may beassociated with the identification information 214B. One or moreportions of the identity information 214A and/or identificationinformation 214B may be encrypted using the encryption key 215. Thelocal electronic device 202 may store one or more local copies (or localstores) 214C on the storage medium 219. The local electronic device 202may store a portion of the identity information 214A and/oridentification information 214B in the local copy 214C.

The processing unit 216 of the local electronic device 202 may executeinstructions stored in the storage medium 219 to perform variousfunctions. For example, the functions may include communicating with theidentity system device 201 via the network 210 using the communicationunit 217, storing information in the local copy 214C, obtaining userinput via the input/output component 218, determining an identity bycomparing user input to stored identification information in the localcopy 214C, performing one or more actions using information in storedidentity information in the local copy 214C, the various functionsdiscussed above as performed by the local electronic device 202 of FIG.2 , and so on. Similarly, the processing unit 211 of the identity systemdevice 201 may execute instructions stored in the storage medium 213 toperform various functions. For example, the functions may includecommunicating with the local electronic device 202 via the network 210using the communication unit 212, storing and/or maintaining theidentity information 214A and/or the identification information 214B,the various functions discussed above as performed by the identitysystem device 101 of FIG. 1 , and so on.

The local electronic device 202 may be any kind of electronic devicewithout departing from the scope of the present disclosure. For example,the local electronic device 202 may be a desktop computing device, alaptop computing device, a mobile computing device, a tablet computingdevice, a mobile telephone, a smart phone, a digital media player, awearable device, a vehicle, a kitchen appliance, a point of saleterminal, a kiosk, and so on. Similarly, the identity system device 201may be any kind of electronic device without departing from the scope ofthe present disclosure.

FIG. 3 depicts a flow chart illustrating a first example method 300 foroperating a distributed identity system with local identification. Thismethod 300 may be performed by the systems 100, 200 of FIGS. 1 and/or 2.

At operation 310, one or more electronic devices (such as one or more ofthe identity system devices 101, 201 and/or the local electronic devices102A-D, 202 of FIGS. 1 and/or 2 ) may determine identity information andidentification information from a main copy (or main store) to storelocally in a local copy (or local store). The electronic device maydetermine identity information and identification information to storelocally based on a function of an electronic device that will use thelocal copy, the location of the electronic device that will use thelocal copy, a time period, and/or other factors. For example, whencreating a local copy for a security kiosk at an airport, the electronicdevice may determine to locally store identity information andidentification information for all passengers with flights at thatairport for the next day.

At operation 320, the electronic device may store the determinedidentity information and identification information locally. Theelectronic device may obtain the determined identity information andidentification information and store it locally, push or otherwiseprovide the determined identity information and identificationinformation to the electronic device that is to store the determinedidentity information and identification information locally, and so on.

At operation 330, the electronic device may determine whether or not toperform an identification. For example, the electronic device maydetermine to perform an identification upon receipt of user input (suchas one or more digital representations of biometrics and so on) that maybe used to perform an identification. If so, the flow may proceed tooperation 340. Otherwise, the flow may return to operation 330 where theelectronic device may again determine whether or not to perform anidentification.

At operation 340, the electronic device may determine whether or notidentity can be determined using the local copy. For example, theelectronic device may compare user input (such as one or more digitalrepresentations of biometrics and so on) to identification informationstored in the local copy to determine if there is a match. If so, theflow may proceed to operation 350. Otherwise, the flow may proceed tooperation 380 where the electronic device may determine the identityusing identity information stored in the main copy (and/or obtain theidentity information stored in the main copy, the identity informationstored in the main copy that is associated with the identityinformation, and so on) before the flow proceeds to operation 350.

At operation 350, after the electronic device determines the identity,the electronic device may perform one or more actions using identityinformation associated with the identity. For example, the electronicdevice may obtain a name stored in the stored identity information inthe local copy, determine an entitlement indicated in the identityinformation stored in the local copy, allow entrance based on anentitlement indicated in the stored identity information in the localcopy, update an entitlement indicated in the stored identity informationin the local copy based on an action that the electronic deviceperforms, verify an age indicated in the stored identity information inthe local copy, process a payment using financial information (such as acredit card, bank account number, rewards account, airline miles, acredit account created by the electronic device using information storedin the stored identity information in the local copy, and so on) in thestored identity information in the local copy, and so on.

The flow may then proceed to operation 360 where the electronic devicemay determine whether or not an upload condition occurs. An uploadcondition may be elapse of a time period (such as one hour, 5 hours, oneday, and so on), completion of an event, receipt of an upload request,completion of a flight, data to upload reaching a threshold size (suchas 5 megabytes, 50 megabytes, 900 megabytes, and so on), and/or anyother condition that may trigger a data upload.

If so, the flow may proceed to operation 370 where the electronic devicemay upload data (such as to an identity system device and/or otherelectronic device that stores and/or maintains the main copy) related tothe performed actions. Otherwise, the flow may return to operation 330where the electronic device may determine whether or not identity can bedetermined using the local copy.

Although the example method 300 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, the method 300 is illustrated and described as determiningthe identity information and identification information from a main copyto store locally. However, it is understood that this is an example. Insome implementations, the electronic device may omit this determinationand instead locally store whatever identity information andidentification information from a main copy is provided. Variousconfigurations are possible and contemplated without departing from thescope of the present disclosure.

In various examples, this example method 300 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed within a cloud network and/or by one or more computingdevices, such as the identity system devices 101, 201 and/or the localelectronic devices 102A-D, 202 of FIGS. 1 and/or 2 .

FIG. 4 depicts a flow chart illustrating a second example method 400 foroperating a distributed identity system with local identification. Thismethod 400 may be performed by the systems 100, 200 of FIGS. 1 and/or 2.

At operation 410, an electronic device (such as the identity systemdevices 101, 201 of FIGS. 1 and/or 2 ) may determine identityinformation and identification information from a main copy to storelocally. At operation 420, the electronic device may store thedetermined identity information and identification information locally.For example, the electronic device may receive a request for a localcopy from a local electronic device and may transmit the local copy tothe local electronic device for the local electronic device to storelocally. By way of another example, the electronic device may determineto push the local copy to the local electronic device for the localelectronic device to store locally.

At operation 430, the electronic device may determine whether or not arequest is received from the local electronic device. For example, thelocal electronic device may request additional identity informationand/or identification information from the main copy, performance of anidentification that the local electronic device cannot perform,processing of a payment request, and so on. If so, the flow may proceedto operation 470 where the electronic device may perform the requestbefore the flow proceeds to operation 440. Otherwise, the flow mayproceed directly to operation 440.

At operation 440, the electronic device may determine whether or not toupdate the local copy. For example, the local electronic device maydetermine to update the local copy if the main copy changes (such as newsets of identity information and/or identification information beingadded to the main copy and/or new sets of identity information and/oridentification information matching conditions under which a portion ofthe main copy was stored locally in the local copy being added to themain copy), if parameters change that influenced whether or not portionsof the main copy were stored locally in the local copy (such as a timeperiod used to select the portion of the main copy have changed, apassenger list used to select the portion of the main copy has changed,and so on), and so on. If so, the flow may proceed to operation 480where the electronic device may update the local copy (such as bytransmitting one or more updates to the local electronic device and soon) before the flow proceeds to operation 450. Otherwise, the flow mayproceed directly to operation 450.

At operation 450, the electronic device may determine whether or notdata related to one or more actions performed by the local electronicdevice are received. The electronic device may receive such data fromthe local electronic devices upon occurrence of one or more uploadconditions, upon the local electronic devices determining that theupload condition has occurred, upon request, and so on. If not, the flowmay proceed to operation 430 where the electronic device may determinewhether or not a request is received from the local electronic device.Otherwise, the flow may proceed to operation 460 where the electronicdevice may process the data (such as by updating the identityinformation and/or identification information in the main copy,processing one or more payments, and so on) before the flow returns tooperation 430 where the electronic device may determine whether or not arequest is received from the local electronic device.

Although the example method 400 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, the method 400 is illustrated and described as determiningwhether or not to update the local copy and updating the local copy.However, it is understood that this is an example. In someimplementations, the electronic device may not update the local copy andthus may omit determining whether or not to do so. Variousconfigurations are possible and contemplated without departing from thescope of the present disclosure.

In various examples, this example method 400 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed within a cloud network and/or by one or more computingdevices, such as the identity system devices 101, 201 of FIGS. 1 and/or2 .

FIG. 5 depicts a flow chart illustrating a third example method 500 foroperating a distributed identity system with local identification. Thismethod 500 may be performed by the systems 100, 200 of FIGS. 1 and/or 2.

At operation 501, an electronic device (such as the local electronicdevices 102A-D, 202 of FIGS. 1 and/or 2 ) may receive a local store (orlocal copy). The electronic device may receive the local store from anidentity system device. In some implementations, the electronic devicemay receive the local store in response to submitting or transmittingone or more requests. In other implementations, the local store may bepushed to the electronic device. At operation 502, the electronic devicemay store the local store.

At operation 503, the electronic device may determine whether or not toperform an identification upon receipt of user input (such as one ormore digital representations of biometrics and so on). If so, the flowmay proceed to operation 504. Otherwise, the flow may return tooperation 503 where the electronic device may again determine whether ornot to perform an identification.

At operation 504, the electronic device may determine whether or notidentity can be determined using the local store. If so, the flow mayproceed to operation 505. Otherwise, the flow may proceed to operation508 where the electronic device may transmit a request to an electronicdevice that stores the main store from which the local store was derivedbefore the flow proceeds to operation 505. The request may be to obtainthe identity information stored in the main store, to obtain theidentity information stored in the main store that is associated withthe identity information, for an identification to be performed usingthe main store, and so on.

At operation 505, after the electronic device determines the identity,the electronic device may perform one or more actions using identityinformation associated with the identity. For example, the electronicdevice may obtain a name, determine an entitlement, allow entrance basedon an entitlement, update an entitlement based on an action that theelectronic device performs, verify an age, process a payment usingfinancial information, and so on.

The flow may then proceed to operation 506 where the electronic devicemay determine whether or not an update to the local store is received.The update to the local store may be received from an identity systemdevice or other electronic device that stores the main store from whichthe local store was derived. If so, the flow may proceed to operation509 where the electronic device may update the local store before theflow proceeds to operation 507. Otherwise, the flow may proceed directlyto operation 507.

At operation 507, the electronic device may determine whether or not anupload condition has occurred. If so, the flow may proceed to operation510 where the electronic device may upload data related to any performedactions (such as to an identity system device or other electronic devicethat stores the main store from which the local store was derived)before the flow returns to operation 503 where the electronic device maydetermine whether or not to perform an identification. Otherwise, theflow may return directly to operation 503.

Although the example method 500 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, the method 500 is illustrated and described as determiningwhether or not an upload condition occurs after determining whether ornot an update is received. However, it is understood that this is anexample. In various implementations, these operations may be performedin different orders, performed simultaneously, performed substantiallysimultaneously, omitted, and so on. Various configurations are possibleand contemplated without departing from the scope of the presentdisclosure.

In various examples, this example method 500 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed within a cloud network and/or by one or more computingdevices, such as the local electronic devices 102A-D, 202 of FIGS. 1and/or 2 .

FIG. 6 depicts a flow chart illustrating a fourth example method 600 foroperating a distributed identity system with local identification. Thismethod 600 may be performed by the systems 100, 200 of FIGS. 1 and/or 2.

At operation 610, an electronic device (such as the identity systemdevices 101, 201 and/or the local electronic devices 102A-D, 202 ofFIGS. 1 and/or 2 ) may determine parameters for identities to storelocal in a local copy (or local store). Such parameters may beassociated with the function of an electronic device that will use thelocal copy, the location of the electronic device that will use thelocal copy, a time period, and/or other factors. For example, whencreating a local copy for a security kiosk at an airport, the parametersmay include a list of flight manifests for all passengers with flightsat that airport for the next day.

At operation 620, the electronic device may obtain identificationinformation and identity information based on the parameters, such asfrom a main copy (or main store). For example, the electronic device mayobtain a portion of identification information and identity informationstored by an identity system device and/or a database maintained by theidentity system device that satisfies the parameters.

At operation 630, the electronic device may locally store the obtainedidentification information and identity information in a local copy atan electronic device that will use the local copy. For example, theelectronic device may be the electronic device that will use the localcopy and may obtain the identification information and identityinformation and locally store such. In another example, the electronicdevice may be an identity system device that may obtain theidentification information and identity information and transmit such tothe electronic device that will use the local copy for performingidentifications.

Although the example method 600 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, operation 620 is illustrated and described as obtaining theidentification information and identity information. However, in someimplementations, the electronic device performing the method 600 may bean identity system device that maintains the identification informationand identity information from which the identification information andidentity information corresponding to the parameters is derived. In suchan example, operation 620 may involve deriving the identificationinformation and identity information corresponding to the parametersfrom the main copy of the identification information and identityinformation stored and maintained by the identity system device. Variousconfigurations are possible and contemplated without departing from thescope of the present disclosure.

In various examples, this example method 600 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed within a cloud network and/or by one or more computingdevices, such as the identity system devices 101, 201 and/or the localelectronic devices 102A-D, 202 of FIGS. 1 and/or 2 .

In various implementations, a distributed identity system with localidentification may include an identity system device that storesidentity information and biometric identification information and alocal electronic device. The local electronic device may store a localcopy of at least a portion of the identity information and the biometricidentification information, determine identities by comparing receiveddigital representations of biometrics with the biometric identificationinformation included in the local copy, perform actions using theidentity information included in the local copy that corresponds to theidentities; and upload data related to the actions to the identitysystem device upon occurrence of an upload condition.

In some examples, the upload condition may be at least one of elapse ofa time period, completion of an event, an upload request received by thelocal electronic device from the identity system device, the datareaching a threshold size, or completion of a flight. In variousexamples, the identity system device may determine an update to thelocal copy and transmit the update to the local electronic device. Insome examples, the local electronic device may be operative to changethe upload condition.

In various examples, at least part of the identity information may beencrypted using an encryption key and the encryption key may be storedby the identity system device and the local electronic device. In somesuch examples, the local electronic device may be operative to deletethe encryption key stored by the local electronic device. For example,the local electronic device may delete the encryption key in response toan instruction received from the identity system device.

In some embodiments, an electronic device in a distributed identitysystem with local identification may include a non-transitory storagemedium that stores instructions, a biometric reader device, acommunication unit, and a processor. The processor may execute theinstructions to receive a local store, from an identity system deviceusing the communication unit, that includes at least a portion ofidentity information and biometric identification information stored bythe identity system device; determine identities by comparing digitalrepresentations of biometrics, received via the biometric reader device,with the biometric identification information included in the localstore; perform actions using the identity information included in thelocal store that corresponds to the identities; and upload data relatedto the actions to the identity system device using the communicationunit upon occurrence of an upload condition.

In various examples, the actions may include allowing entrance based ona ticket and the processor updates a status of the ticket in the localstore based on the entrance. In some examples, the identity informationmay include a verified age. In various examples, the identityinformation may include payment information.

In some examples, the electronic device may further include an accesscontrol mechanism and the actions may include the processor controllingaccess by operating the access control mechanism. In various examples,the digital representations of the biometrics may include a digitalrepresentation of at least one of a fingerprint, a voiceprint, a facialimage, a retina image, an iris image, a heart rhythm or other biologicalinformation, or a gait. In some examples, the biometric reader devicemay include at least one of a fingerprint scanner, an opticalfingerprint scanner, a phosphorescent fingerprint scanner, a camera, animage sensor, a heart rhythm monitor or other biological sensor, or amicrophone.

In various implementations, an electronic device in a distributedidentity system with local identification may include a non-transitorystorage medium, a communication unit, and a processor. Thenon-transitory storage medium may store instructions, identityinformation, and biometric identification information. The processor mayexecute the instructions to determine at least a portion of the identityinformation and the biometric identification information to store at alocal electronic device; transmit the portion of the identityinformation and the biometric identification information to the localelectronic device using the communication unit; after occurrence of anupload condition, receive data from the local electronic device usingthe communication unit, the data related to actions performed by thelocal electronic device using identity information included in theportion of the identity information and the biometric identificationinformation that corresponds to identities determined by the localelectronic device as a result of comparing received digitalrepresentations of biometrics to the biometric identificationinformation included in the portion of the identity information and thebiometric identification information; and process the data to update theidentity information.

In some examples, the local electronic device may be a component of anaircraft and the processor may determine the at least the portion of theidentity information and the biometric identification information tostore at the local electronic device by selecting the identityinformation and the biometric identification information thatcorresponds to a flight manifest for the aircraft. In various examples,the local electronic device may be a ticketing device for an event andthe processor may determine the at least the portion of the identityinformation and the biometric identification information to store at thelocal electronic device by selecting the identity information and thebiometric identification information that corresponds to ticket holdersfor the event. In some examples, the local electronic device may be acomponent of a vehicle and the processor may determine the at least theportion of the identity information and the biometric identificationinformation to store at the local electronic device by selecting theidentity information and the biometric identification information thatcorresponds to permitted operators of the vehicle. In various examples,the local electronic device may be a component of a secured area and theprocessor may determine the at least the portion of the identityinformation and the biometric identification information to store at thelocal electronic device by selecting the identity information and thebiometric identification information that corresponds to permittedentrants to the secured area.

In some examples, the local electronic device may be a first localelectronic device, the portion of the identity information and thebiometric identification may be a first portion of the portion of theidentity information and the biometric identification, the uploadcondition is a first upload condition, the data may be first data, theactions may be first actions, the identities may be first identities,and the received digital representations of biometrics may be firstreceived digital representations of biometrics. In such examples, theprocessor may be operative to determine at least a second portion of theidentity information and the biometric identification information tostore at a second local electronic device; transmit the second portionof the identity information and the biometric identification informationto the second local electronic device using the communication unit;after occurrence of a second upload condition, receive second data fromthe second local electronic device using the communication unit, thesecond data related to second actions performed by the second localelectronic device using identity information included in the secondportion of the identity information and the biometric identificationinformation that corresponds to second identities determined by thesecond local electronic device as a result of comparing second receiveddigital representations of biometrics to the biometric identificationinformation included in the second portion of the identity informationand the biometric identification information; and process the seconddata to update the identity information.

FIG. 7 depicts a third example distributed identity system 700 withlocal identification. In this example, the distributed identity system700 may include a ticket station 702 at a venue that controls accessbased on whether or not a person 703 has a valid ticket for entrance.The ticket station 702 may include a biometric reader device 718 and anaccess control mechanism 720. The ticket station 702 may obtain adigital representation of a biometric using the biometric reader device718, determine an identity by comparing the digital representation ofthe biometric to stored biometric identification information in a localcopy (or local store), and allow access by controlling the accesscontrol mechanism 720 if information in the stored identity informationin the local copy associated with the identity indicates that the person703 has a valid ticket for entrance. Upon occurrence of an uploadcondition, such as completion of an event at the venue corresponding tothe ticket, the ticket station 702 may upload data (such as to anidentity system device that maintains the identity information fromwhich the stored identity information was obtained) related to allowingaccess, use of the ticket, change in status of the ticket, other actionsthe ticket station 702 performs, and so on.

For example, the biometric reader device 718 is illustrated as afingerprint scanner and the access control mechanism 720 is illustratedas a gate arm. The fingerprint scanner may obtain an image of theperson's fingerprint, determine an identity by comparing the image(and/or a hash or other digital representation of the image) to storedfingerprint images (and/or stored hashes or other digitalrepresentations of the fingerprint image) in the local copy, and controlthe gate arm to allow the person 703 inside if a valid ticket isassociated with the identity.

FIG. 8 depicts a flow chart illustrating a fifth example method 800 foroperating a distributed identity system with local identification. Thismethod 800 may be performed by the systems 200, 700 of FIGS. 2 and/or 7.

At operation 801, an electronic device (such as the ticket station 702of FIG. 7 ) may receive identification information and identityinformation for ticket holders related to an event at a venue. The flowmay proceed to operation 802 where the electronic device may store thedata in a local store.

The flow may then proceed to operation 803 where the electronic devicemay determine whether or not one or more digital representations ofbiometrics are received. The one or more digital representations of thebiometrics may be one or more fingerprints, voiceprints, facial images,retina images, iris images, gaits, a heart rhythms or other biologicalinformation, and so on. The one or more digital representations of thebiometrics may be obtained using one or more biometric reader devices(such as a fingerprint scanner, an optical fingerprint scanner, aphosphorescent fingerprint scanner, a camera, an image sensor, amicrophone, a heart rhythm monitor or other biological sensor, and soon). If so, the flow may proceed to operation 804. Otherwise, the flowmay return to operation 803 where the electronic device may againdetermine whether or not one or more digital representations ofbiometrics are received.

At operation 804, after the electronic device determines that one ormore digital representations of biometrics are received, the electronicdevice may determine whether or not an identity can be determined usingthe one or more digital representations of biometrics and the localstore (such as by comparing the one or more digital representations ofbiometrics to stored biometric data stored in the local store). If so,the flow may proceed to operation 805. Otherwise, the flow may proceedto operation 810.

At operation 805, after the electronic device determines that anidentity can be determined using the one or more digital representationsof biometrics and the local store, the electronic device may determinewhether or not identity information in the local store indicates that avalid ticket is associated with the identity. If so, the flow mayproceed to operation 806 where the electronic device may allow entry tothe event. The electronic device may allow entry by controlling anaccess control mechanism (such as a gate arm, a door, a turnstile,and/or any other device operable to control entrance). Otherwise, theflow may proceed to operation 807 where the electronic device may refuseentry to the event (such as by controlling the access control mechanismto refuse entrance). The flow may then proceed to operation 808.

At operation 808, the electronic device may determine whether or not theevent is finished. For example, the electronic device may storeinformation regarding a time when the event is finished and may comparethe stored time to a current time. If the event is finished, the flowmay proceed to operation 809 where the electronic device may uploadevent data (such as uploading information regarding received digitalrepresentations of biometrics, tickets used for entrance, determinedidentities, entrances allowed, entrances refused, and so on to one ormore electronic devices, such as an identity system device thatmaintains the main store from which the local store was derived).Otherwise, the flow may return to operation 803 where the electronicdevice may determine whether or not one or more digital representationsof biometrics are received.

At operation 810, after the electronic device determines that anidentity cannot be determined using the one or more digitalrepresentations of biometrics and the local store, the electronic devicemay contact an electronic device (such as an identity system device)that maintains a main store from which the local store was derived.Contact may include transmitting the one or more digital representationsof the biometrics. The flow may then proceed to operation 811 where theelectronic device may determine whether or not the identity can bedetermined using the main store (such as whether an identity is providedin response to the contact, identity and/or identity information isprovided in response to the contact, ticket information is provided inresponse to the contact, and so on). If so, the flow may proceed tooperation 805 where the electronic device may determine whether or notidentity information in the local store indicates that a valid ticket isassociated with the identity. Otherwise, the flow may proceed tooperation 807 where the electronic device may refuse entry to the event.

Although the example method 800 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, the method 800 is illustrated and described as determiningwhether or not the event is finished after allowing entry. However, itis understood that this is an example. In various implementations, theelectronic device may determine whether or not the event is finished atany time without departing from the scope of the present disclosure.

Further, the method 800 is illustrated and described as uploading eventdata upon determining that the event is finished. However, it isunderstood that this is an example. In various implementations, theelectronic device may upload event data upon determining that any numberof different upload conditions have occurred (such as the lapse of atime period, event data reaching a threshold size, and so on). Variousconfigurations are possible and contemplated without departing from thescope of the present disclosure.

In various examples, this example method 800 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed within a cloud network and/or by one or more computingdevices, such as the local electronic devices 202 of FIG. 2 and/or theticket station 702 of FIG. 7 .

FIG. 9 depicts a fourth example distributed identity system 900 withlocal identification. In this example, the distributed identity system900 may include a vehicle 902. The vehicle 902 may include a biometricreader device 918, which is illustrated as a microphone that obtains avoiceprint for a person 903. The vehicle 902 may obtain the voiceprint(and/or another digital representation of a biometric) using thebiometric reader device 918 (and/or other biometric reader device),determine an identity by comparing the voice print to stored biometricidentification information in a local copy, and allow operation of thevehicle 902 and/or configure the vehicle 902 according to storedidentity information in the local copy if the person 903 has permissionto operate the vehicle 902 as specified in identity information storedby the vehicle 902 in the local copy. Upon occurrence of an uploadcondition (such as completion of operation, detection of an emergency,lapse of a time period, and so on), the vehicle 902 may upload datarelated to operation of the vehicle 902 (such as routes taken,determined identities, provided digital representations of biometrics,determined conditions of the person 903, speed limits or other rules orlaws broken using the vehicle 902, and so on), such as to an identitysystem device or other electronic device that maintains a main copy fromwhich the local copy was derived.

In various implementations, a group of people may have one or more setsof permissions with respect to operating the vehicle 902. In suchimplementations, the vehicle 902 may store biometric identificationinformation and identity information in the local copy for each of thegroup of people.

In some implementations, the identity information may specify one ormore configuration options for the vehicle 902 for the person 903. Forexample, such configuration options may include a seat position, vehicletemperature, entertainment system settings, control settings, timeand/or location of permitted operation, and so on. In suchimplementations, the vehicle 902 may control one or more componentsaccording to the configuration options upon determining the identity.

FIG. 10 depicts a flow chart illustrating a sixth example method 1000for operating a distributed identity system with local identification.This method 1000 may be performed by the systems 200, 900 of FIGS. 2and/or 9 .

At operation 1010, an electronic device (such as the vehicle 902 of FIG.9 ) may receive a local copy from an identity system device thatmaintains a main copy of identity information and biometricidentification information. The flow may proceed to operation 1020 wherethe electronic device stores the local copy.

Next, the flow may proceed to operation 1030 where the electronic devicemay determine whether or not an identity can be identified, such as bycomparing a received digital representation of a biometric to storedbiometric identification information in the local copy. If so, the flowmay proceed to operation 1040. Otherwise, the flow may return tooperation 1030 where the electronic device may again determine whetheror not an identity can be identified.

At operation 1040, after the electronic device determines the identity,the electronic device may determine whether or not stored identityinformation in the local copy associated with the identity indicatesthat vehicle operation is permitted. If not, the flow may return tooperation 1030 where the electronic device may again determine whetheror not an identity can be identified. Otherwise, the flow may proceed tooperation 1050.

At operation 1050, the electronic device may allow use of the vehicle.The flow may then proceed to operation 1060 where the electronic devicemay monitor operation of the vehicle. Next, the flow may proceed tooperation 1070 where the electronic device may determine whether or notuse of the vehicle is over. If not, the flow may return to operation1060 where the electronic device may continue to monitor operation ofthe vehicle. Otherwise, the flow may proceed to operation 1080 where theelectronic device may upload data from the monitored use of the vehicle,such as to an identity system device or other electronic device thatmaintains the main copy from which the local copy was derived.

Although the example method 1000 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, the method 1000 is illustrated and described in the contextof operation of a vehicle. However, it is understood that this is anexample. In various implementations, similar methods may be used in thecontext of any kind of electronic device operation, such as mobiletelephone operation, laptop computer operation, digital media playeroperation, kitchen appliance operation, and so on. Variousconfigurations are possible and contemplated without departing from thescope of the present disclosure.

In various examples, this example method 1000 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed within a cloud network and/or by one or more computingdevices, such as the local electronic devices 202 of FIG. 2 and/or thevehicle 902 of FIG. 9 .

FIG. 11 depicts a fifth example distributed identity system 1100 withlocal identification. In this example, the distributed identity system1100 may be an automated controlled access building 1102. The automatedcontrolled access building 1102 may include a biometric reader device1118 and an access control mechanism 1120. The automated controlledaccess building 1102 may obtain a digital representation of a biometricusing the biometric reader device 1118, determine an identity bycomparing the digital representation of the biometric to storedbiometric identification information in a local copy, and allow accessby controlling the access control mechanism 1120 if information instored identity information in the local copy associated with theidentity indicates that a person 1103 has permission to enter theautomated controlled access building 1102.

For example, the biometric reader device 1118 is illustrated as a cameraand the access control mechanism 1120 is illustrated as an automateddoor. The camera may obtain an image of the person's face, determine anidentity by comparing the image to stored facial images in the localcopy, and control the automated door to allow the person 1103 inside ifthe person 1103 has permission to enter the automated controlled accessbuilding 1102.

The automated controlled access building 1102 may also upload data (suchas data relating to digital representations of biometrics received,identities determined, accesses allowed or prohibited, and so on). Forexample, the automated controlled access building 1102 may upload suchdata to an identity system device that maintains a main copy from whichthe local copy was derived or received.

In some implementations, the automated controlled access building 1102may upload the data as soon as collected. In other implementations, theautomated controlled access building 1102 may upload the data upon theoccurrence of an upload condition. By way of example, the automatedcontrolled access building 1102 may upload the data upon the occurrenceof the upload condition in order to minimize communication networktraffic.

By way of another example, the automated controlled access building 1102may be a secured area and the operator of the secured area may protectreal time access to people entering the automated controlled accessbuilding 1102. To illustrate, the automated controlled access building1102 may upload the data once per day in order to maintain accurate logsof people who enter but restrict real time access to such data.

In other examples, the automated controlled access building 1102 may beoperable to switch between immediate upload and upload when the uploadcondition occurs. For example, the automated controlled access building1102 may operate in an unsecure mode where data is uploaded immediatelyand a secure mode where the data is uploaded upon occurrence of anupload condition. In such an example, the automated controlled accessbuilding 1102 may be operable to switch between the secure and unsecuremodes, such as in response to a transmitted notification to switchmodes.

In various examples, the automated controlled access building 1102 maybe operable to change the upload condition. For example, the automatedcontrolled access building 1102 may upload the data every 4 hours,determine that communication network traffic is high, and switch touploading the data every 8 hours. Various configurations are possibleand contemplated without departing from the scope of the presentdisclosure.

In another example, the automated controlled access building 1102 maystore a local copy of a portion of one or more third party databasesand/or other electronic devices that relate to access. For example, theautomated controlled access building 1102 may store a local copy of aportion of a law enforcement wanted list and/or other blacklist,criminal watch list, and so on. In some implementations, the automatedcontrolled access building 1102 may store a local copy of the portion ofsuch a third party database and/or other electronic device associatedwith all of the people who have permission to enter. In this way, theautomated controlled access building 1102 may be able to use theinformation from the third party database and/or other electronic devicewithout actually currently communicating with the third party databaseand/or other electronic device. Various configurations are possible andcontemplated without departing from the scope of the present disclosure.

FIG. 12 depicts a flow chart illustrating a seventh example method 1200for operating a distributed identity system with local identification.This method 1200 may be performed by the systems 200, 1100 of FIGS. 2and/or 11 .

At operation 1210, an electronic device (such as the automatedcontrolled access building 1102 of FIG. 11 ) may store a local copy ofidentity information and biometric identification information that isderived from an identity system device that maintains a main copy ofsuch information. For example, the local copy may be received from anidentity system device that maintains the main copy from which the localcopy is derived.

The flow may proceed to operation 1220 where the electronic device maydetermine whether or not one or more digital representations ofbiometrics are received, such as from one or more people attempting toenter a building or other secure area. If so, the flow may proceed tooperation 1230. Otherwise, the flow may return to operation 1220 wherethe electronic device may again determine whether or not one or moredigital representations of biometrics are received.

At operation 1230, the electronic device may compare the one or moredigital representations of biometrics to biometric identificationinformation stored in the local copy, determine an identity basedthereon, and use associated stored identity information in the localcopy to determine if access is permitted. If so, the flow may proceed tooperation 1240 where the electronic device may allow access before theflow proceeds to operation 1260. Otherwise, the flow may proceed tooperation 1250 where the electronic device may deny access before theflow proceeds to operation 1260.

At operation 1260, the electronic device may determine if the electronicdevice is operating in secure mode. If so, the flow may proceed tooperation 1280 where the electronic device may report or upload data(such as data regarding received digital representations of biometrics,determined identities, access allowed or denied, and so on to anelectronic device like the identity system device that maintains themain copy from which the local copy is derived) and the flow may returnto operation 1220 where the electronic device may again determinewhether or not one or more digital representations of biometrics arereceived. Otherwise, the flow may proceed to operation 1270 where theelectronic device may report or upload the data and the flow may returnto operation 1220 where the electronic device may again determinewhether or not one or more digital representations of biometrics arereceived.

Although the example method 1200 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, the method 1200 is illustrated and described as using oneor more digital representations of biometrics to performidentifications. However, it is understood that this is an example. Invarious implementations, the electronic device may use other informationother than biometrics to determine identities. For example, in someimplementations, an electronic device may determine a social mediaaccount associated with a person and determine an identity for thatperson based on information contained in that social media accountand/or one or more connections to that social media account from othersocial media accounts and/or other information sources. Variousconfigurations are possible and contemplated without departing from thescope of the present disclosure.

In various examples, this example method 1200 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed within a cloud network and/or by one or more computingdevices, such as the local electronic devices 202 of FIG. 2 and/or theautomated controlled access building 1102 of FIG. 11 .

FIG. 13 depicts a sixth example distributed identity system 1300 withlocal identification. In this example, the distributed identity system1300 may include an individual point of sale device 1302 on an airplane.The individual point of sale device 1302 may include a biometric readerdevice 1318. A person 1303 may use the individual point of sale device1302 to request goods and/or services, such as an alcoholic beverage.The individual point of sale device 1302 may obtain a digitalrepresentation of a biometric using the biometric reader device 1318,determine an identity by comparing the digital representation of thebiometric to stored biometric identification information in a localcopy, and arrange for a request to be fulfilled or denied based oninformation in stored identity information in the local copy associatedwith the identity. When the flight ends, the individual point of saledevice 1302 may upload data related to any identifications that weremade during the flight, transactions that were performed during theflight, and so on.

For example, the individual point of sale device 1302 may store identityinformation and biometric identification information in a local copy forall of the passengers on a plane's flight manifest. As everyone on aplane should be on the plane's flight manifest, the individual point ofsale device 1302 may be able to minimize the amount of identityinformation and biometric identification information to be stored inorder to operate and be able to operate while out of communication andupdate centralized data once the flight is over and communication withcentralized data is again is available.

The individual point of sale device 1302 may then receive a request foran alcoholic beverage from the person 1303, use the biometric readerdevice 1318 (shown as a camera that obtains a facial image, an irisimage, a retina image, and so on) to obtain a digital representation ofa biometric, identify the person 1303, determine a verified age for theperson from the stored identity information in the local copy associatedwith the person's identity, and arrange for the request to be fulfilled(such as by signaling cabin crew to fulfill the request, dispensing thealcoholic beverage, and so on) if the person's verified age meets alegal threshold (such as twenty one years of age, eighteen years of age,and so on) for the consumption of alcoholic beverages. The individualpoint of sale device 1302 may also determine payment informationassociated with the person's identity and process payment using thepayment information. This may enable the individual point of sale device1302 to verify age and/or payment for requested alcoholic beveragesduring a flight even if the individual point of sale device 1302 cannotcurrently communicate with a central data storing age and/or paymentinformation from which the local copy is derived.

By way of another example, one or more electronic devices on an aircraftor at another location may store a local copy of identificationinformation and/or identity information for one or more pilots and/orother staff scheduled to use and/or work on the aircraft. Should aperson report as staff whose identification information and/or identityinformation is not stored in the local copy, additional securityprocedures may be performed to ensure the person is validly assigned touse and/or work on the aircraft. Various configurations are possible andcontemplated without departing from the scope of the present disclosure.

FIG. 14 depicts a flow chart illustrating an eighth example method 1400for operating a distributed identity system with local identification.This method 1400 may be performed by the systems 200, 1300 of FIGS. 2and/or 13 .

At operation 1410, an electronic device (such as the individual point ofsale device 1302 of FIG. 13 ) may receive information for a passengerlist. For example, the electronic device may receive identityinformation and biometric identification information associated withidentities corresponding to the passenger list for a flight. The flowmay proceed to operation 1420 where the electronic device may store theinformation in a local copy (or local store).

The flow may then proceed to operation 1430 where the electronic devicemay determine whether or not one or more digital representations ofbiometrics are received. If not, the flow may return to operation 1430where the electronic device may again determine whether or not one ormore digital representations of biometrics are received. Otherwise, theflow may proceed to operation 1440.

At operation 1440, the electronic device may determine an identity usingthe one or more digital representations of the biometrics and the localcopy. Next, the flow may proceed to operation 1450 where the electronicdevice may process one or more transactions using identity informationin the local copy associated with the identity. The flow may thenproceed to operation 1460.

At operation 1460, the electronic device may determine whether or notthe flight is over. If so, the flow may proceed to operation 1470 wherethe electronic device may upload data regarding any transactions,received digital representations of biometrics, identifications, and soon. Otherwise, the flow may return to operation 1430 where theelectronic device may again determine whether or not one or more digitalrepresentations of biometrics are received.

Although the example method 1400 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, the method 1400 is illustrated and described in the contextof a flight. However, it is understood that this is an example. In otherimplementation, the method 1400 may be used in other contexts, such as atrain trip, a bus ride, and so on. For example, a ticket list may beused to store a local copy of identity information and biometricidentification information from a main copy at point of sale devices atseats in an event venue and people at those seats may be able to usethose point of sale devices to order and/or pay for concessions, obtaininformation about the event, change ticket information, access and/orutilize a rewards account associated with their identity, and/or performvarious other actions. Various configurations are possible andcontemplated without departing from the scope of the present disclosure.

In various examples, this example method 1400 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed within a cloud network and/or by one or more computingdevices, such as the local electronic devices 202 of FIG. 2 and/or theindividual point of sale device 1302 of FIG. 13 .

Although the present disclosure is illustrated and described in thecontext of caching at local electronic devices that store local copiesof information from one or more identity system devices and updating theone or more identity system devices and update data related to actionsperformed to the one or more identity system devices upon the occurrenceof one or more upload conditions, it is understood that this is anexample. In some implementations, the one or more identity systemdevices may include a number of identity system devices that operate ina cooperative computing arrangement. In such implementations, one ormore of the identity system devices in the cooperative computingarrangement may receive updates from the local electronic devices andsubsequently use the techniques disclosed herein to provide thoseupdates to other identity system devices in the cooperative computingarrangement, such as examples where identity system devices are locatedin each time zone and communicate updates received from local electronicdevices to identity system devices in an adjacent time zone upon theoccurrence of various upload conditions, such as hourly. Variousconfigurations are possible and contemplated without departing from thescope of the present disclosure.

Although the above illustrates and describes a number of embodiments, itis understood that these are examples. In various implementations,various techniques of individual embodiments may be combined withoutdeparting from the scope of the present disclosure.

As described above and illustrated in the accompanying figures, thepresent disclosure relates to a distributed identity system with localidentification. The distributed identity system includes an identitysystem device and at least one local electronic device. The localelectronic device locally stores at least a portion of identityinformation and the biometric identification information stored by theidentity system device. The local electronic device determinesidentities by comparing received digital representations of biometricswith locally stored biometric identification information, performsactions using locally stored identity information included in the localcopy, and uploads data related to the actions to the identity systemdevice upon occurrence of an upload condition. In this way, the systemperforms identifications locally without requiring communication betweencomponents of the system but also uses the system to centrally store andmaintain the identity information and the identification informationthat is used to protect the identity information.

The present disclosure recognizes that biometric and/or other personaldata is owned by the person from whom such biometric and/or otherpersonal data is derived. This data can be used to the benefit of thosepeople. For example, biometric data may be used to conveniently andreliably identify and/or authenticate the identity of people, accesssecurely stored financial and/or other information associated with thebiometric data, and so on. This may allow people to avoid repeatedlyproviding physical identification and/or other information.

The present disclosure further recognizes that the entities who collect,analyze, store, and/or otherwise use such biometric and/or otherpersonal data should comply with well-established privacy policiesand/or privacy practices. Particularly, such entities should implementand consistently use privacy policies and practices that are generallyrecognized as meeting or exceeding industry or governmental requirementsfor maintaining security and privately maintaining biometric and/orother personal data, including the use of encryption and securitymethods that meets or exceeds industry or government standards. Forexample, biometric and/or other personal data should be collected forlegitimate and reasonable uses and not shared or sold outside of thoselegitimate uses. Further, such collection should occur only afterreceiving the informed consent. Additionally, such entities should takeany needed steps for safeguarding and securing access to such biometricand/or other personal data and ensuring that others with access to thebiometric and/or other personal data adhere to the same privacy policiesand practices. Further, such entities should certify their adherence towidely accepted privacy policies and practices by subjecting themselvesto appropriate third party evaluation.

Additionally, the present disclosure recognizes that people may blockthe use of, storage of, and/or access to biometric and/or other personaldata. Entities who typically collect, analyze, store, and/or otherwiseuse such biometric and/or other personal data should implement andconsistently prevent any collection, analysis, storage, and/or other useof any biometric and/or other personal data blocked by the person fromwhom such biometric and/or other personal data is derived.

In the present disclosure, the methods disclosed may be implemented assets of instructions or software readable by a device. Further, it isunderstood that the specific order or hierarchy of steps in the methodsdisclosed are examples of sample approaches. In other embodiments, thespecific order or hierarchy of steps in the method can be rearrangedwhile remaining within the disclosed subject matter. The accompanyingmethod claims present elements of the various steps in a sample order,and are not necessarily meant to be limited to the specific order orhierarchy presented.

The described disclosure may be provided as a computer program product,or software, that may include a non-transitory machine-readable mediumhaving stored thereon instructions, which may be used to program acomputer system (or other electronic devices) to perform a processaccording to the present disclosure. A non-transitory machine-readablemedium includes any mechanism for storing information in a form (e.g.,software, processing application) readable by a machine (e.g., acomputer). The non-transitory machine-readable medium may take the formof, but is not limited to, a magnetic storage medium (e.g., floppydiskette, video cassette, and so on); optical storage medium (e.g.,CD-ROM); magneto-optical storage medium; read only memory (ROM); randomaccess memory (RAM); erasable programmable memory (e.g., EPROM andEEPROM); flash memory; and so on.

The foregoing description, for purposes of explanation, used specificnomenclature to provide a thorough understanding of the describedembodiments. However, it will be apparent to one skilled in the art thatthe specific details are not required in order to practice the describedembodiments. Thus, the foregoing descriptions of the specificembodiments described herein are presented for purposes of illustrationand description. They are not targeted to be exhaustive or to limit theembodiments to the precise forms disclosed. It will be apparent to oneof ordinary skill in the art that many modifications and variations arepossible in view of the above teachings.

What is claimed is:
 1. A system, comprising: a local electronic device; and an identity system device that: stores identity information and biometric identification information; and generates a portion of the identity information and the biometric identification information according to parameters received from the local electronic device, the portion of the identity information and the biometric identification information being a subset of the identity information and the biometric identification information; wherein the local electronic device: stores a local copy of the portion of the identity information and the biometric identification information; and determines identities by comparing received digital representations of biometrics with the biometric identification information included in the local copy.
 2. The system of claim 1, wherein the local electronic device performs actions using the identity information included in the local copy that corresponds to the identities.
 3. The system of claim 2, wherein the local electronic device uploads data related to the actions to the identity system device.
 4. The system of claim 3, wherein the local electronic device uploads the data related to the actions to the identity system device upon occurrence of an upload condition.
 5. The system of claim 1, wherein the identity system device: determines an update to the portion of the identity information and the biometric identification information; and transmits the update to the local electronic device.
 6. The system of claim 1, wherein: at least part of the identity information is encrypted; and encryption information is stored by the identity system device and the local electronic device.
 7. The system of claim 6, wherein the local electronic device deletes the encryption information in response to an instruction received from the identity system device.
 8. An electronic device, comprising: a non-transitory storage medium that stores instructions; and a processor that executes the instructions to: receive a local store, from an identity system device, that includes a portion of identity information and biometric identification information stored by the identity system device, the portion of the identity information and the biometric identification information generated by the identity system device according to parameters received from the electronic device, the portion of the identity information and the biometric identification information being a subset of the identity information and the biometric identification information; determine identities by comparing digital representations of biometrics with the biometric identification information included in the local store; and perform actions using the identity information included in the local store that corresponds to the identities.
 9. The electronic device of claim 8, wherein the processor uploads data related to the actions to the identity system device upon occurrence of an upload condition.
 10. The electronic device of claim 8, wherein the processor receives the digital representations of the biometrics from a biometric reader device.
 11. The electronic device of claim 10, wherein the biometric reader device is incorporated into the electronic device.
 12. The electronic device of claim 10, wherein the biometric reader device comprises at least one of a fingerprint scanner, an optical fingerprint scanner, a phosphorescent fingerprint scanner, a camera, an image sensor, or a microphone.
 13. The electronic device of claim 8, wherein the electronic device further comprises an access control mechanism and the actions comprise the processor controlling access by operating the access control mechanism.
 14. The electronic device of claim 8, wherein the digital representations of the biometrics correspond to at least a portion of a hand.
 15. An electronic device, comprising: a non-transitory storage medium that stores: instructions; identity information; and biometric identification information; and a processor that executes the instructions to: determine a portion of the identity information and the biometric identification information to store at a local electronic device according to parameters received from the local electronic device, the portion of the identity information and the biometric identification information being a subset of the identity information and the biometric identification information; and transmit the portion of the identity information and the biometric identification information to the local electronic device.
 16. The electronic device of claim 15, wherein the processor after occurrence of an upload condition, receives data from the local electronic device, the data related to actions performed by the local electronic device using identity information included in the portion of the identity information and the biometric identification information that corresponds to identities determined by the local electronic device as a result of comparing received digital representations of biometrics to the biometric identification information included in the portion of the identity information and the biometric identification information; and processes the data to update the identity information.
 17. The electronic device of claim 16, wherein the processor processes the data to update the identity information.
 18. The electronic device of claim 15, wherein: the local electronic device comprises a component of a vehicle; and the processor determines the portion of the identity information and the biometric identification information to store at the local electronic device by selecting the identity information and the biometric identification information that correspond to permitted operators of the vehicle.
 19. The electronic device of claim 15, wherein: the local electronic device comprises a component of an area; and the processor determines the portion of the identity information and the biometric identification information to store at the local electronic device by selecting the identity information and the biometric identification information that correspond to permitted entrants to the area.
 20. The electronic device of claim 15, wherein: the local electronic device is a first local electronic device; the portion of the identity information and the biometric identification information is a first portion of the portion of the identity information and the biometric identification information; and the processor is operative to: determine at least a second portion of the identity information and the biometric identification information to store at a second local electronic device; and transmit the at least the second portion of the identity information and the biometric identification information to the second local electronic device. 