Patent attributes
Systems and methods for managing the identity of a user are provided. One example includes receiving personal data identifying the user to define input data. The receiving of personal data is via an application that enables entry of said personal data for verifying the identity of the user by third parties. Then, executing a hash of the input data for generating a hash value. The method includes executing, responsive to input via a user accessible interface of the application, instructions for transmitting the hash value to a block chain over a network connection. The application is configured for receiving back from the block chain a transaction number corresponding to the hash value transmitted to the block chain. Then providing said personal data identifying the user and the transaction number to a third party for verifying the identity of the user. The third party is configured to generate a second hash value using at least part of the personal data. The third party is configured to use the transaction number to retrieve the hash value from the block chain and compare the second hash value with the hash value retrieved from the block chain. If said second hash value matches the retrieved hash value the identity of the user is considered verified by the third party.