one
Systems and methods for securely verifying a subset of personally identifiable information
Last updated:
Abstract:
Disclosed are systems and methods for securely verifying a subset of personally identifiable information (PII) of a first user to a second user is disclosed. A computer-implemented method may include receiving a query request from the second user through a second user application to verify the subset of PII of the first user; prompting the first user, through a first user application, to authenticate the query request; in response to the first user authenticating the query request, processing the query request to identify, in a secured database, the subset of PII of the first user stored in the secured database, to generate an identified subset of PII; comparing the subset of PII to the identified subset of PII to determine if a condition is satisfied; based on the comparing, generating an answer to the query request; and transmitting the answer to the second user through the second user application.
Utility
11 Jan 2019
30 Nov 2021