Patent Issued for Cryptographically transmitting and storing identity tokens and/or activity data among spatially distributed computing devices (USPTO 11757862): Allstate Insurance Company - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
October 4, 2023 Newswires
Share
Share
Post
Email

Patent Issued for Cryptographically transmitting and storing identity tokens and/or activity data among spatially distributed computing devices (USPTO 11757862): Allstate Insurance Company

Insurance Daily News

2023 OCT 04 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- A patent by the inventors Hayes, Howard (Glencoe, IL, US), Park, Jason D. (Chicago, IL, US), Parkinson, John S. (Burlington, VT, US), filed on July 19, 2022, was published online on September 12, 2023, according to news reporting originating from Alexandria, Virginia, by NewsRx correspondents.

Patent number 11757862 is assigned to Allstate Insurance Company (Northbrook, Illinois, United States).

The following quote was obtained by the news editors from the background information supplied by the inventors: “Trusted third party devices are often used to authenticate a computing device or a user of the computing device. For example, the trusted third party device may be used to vouch for the identity of the user if the user provides the third party device with appropriate information (e.g., username/password, PIN code, government ID, etc.). Once the trusted third party device authenticates the computing device or user thereof, the user may be granted permission to perform one or more activities, such as interacting with other computing devices or users thereof. However, various technological problems may exist with using trusted third party devices to authenticate users. For example, the trusted third party device may fail or go offline, and the computing device might not be able to perform the requested activities until the third party device is back online. Third party devices also might not be able to properly secure the user’s identity. For example, if a bad actor is able to obtain the user’s username/password, PIN code, etc., the bad actor may be able to imitate the user and perform activities as the user.”

In addition to the background information obtained for this patent, NewsRx journalists also obtained the inventors’ summary information for this patent: “The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosure. The summary is not an extensive overview of the disclosure. It is neither intended to identify key or critical elements of the disclosure nor to delineate the scope of the disclosure. The following summary merely presents some concepts of the disclosure in a simplified form as a prelude to the description below.

“Aspects of the disclosure relate to a system and method comprising receiving, by a computing device, first identity data associated with a user. The computing device may generate, based on the first identity data associated with the user, a first identity token for the user. The computing device may transmit, to a plurality of other computing devices, the first identity token for the user. Based on a verification of the first identity token for the user by one or more of the plurality of other computing devices, the first identity token for the user may be stored in an identity chain. The first identity token for the user may indicate a prior identity token stored in the identity chain. The computing device may receive a request to perform an activity. In response to receiving the request to perform the activity, the computing device may request second identity data associated with the user. The computing device may receive the second identity data associated with the user. The computing device may generate, based on the second identity data associated with the user, a second identity token for the user. Based on a comparison of the second identity token to the first identity token, the user may be authenticated, and an activity token for the activity may be generated. The activity token for the activity may be stored in an activity chain, and the activity token may indicate a prior activity token stored in an activity chain.

“In some aspects, generating the first identity token for the user may comprise hashing the first identity data associated with the user to generate a character string. In some aspects, the computing device may encrypt the first identity token for the user, and transmitting the first identity token for the user may comprise transmitting the encrypted first identity token for the user. Verification of the first identity token for the user by one or more of the plurality of other computing devices may be based on a consensus algorithm. The first identity data associated with the user may comprise two or more of device activity data associated with the user, location data associated with the user, or biometric data of the user.

“In some aspects, the computing device may receive third identity data associated with the user. The computing device may generate, based on the third identity data associated with the user, a third identity token for the user. The computing device may transmit, to one or more of the plurality of other computing devices, the third identity token for the user. Based on a failure to verify the third identity token for the user by one or more of the plurality of other computing devices, the third identity token for the user may be discarded.

“In some aspects, the computing device may transmit, to one or more of the plurality of other computing devices, the activity token for the activity, and storing the activity token for the activity in the activity chain may be based on a verification of the activity token by one or more of the plurality of other computing devices. The computing device and the plurality of other computing devices may form a network of trusted computing devices in some examples.”

The claims supplied by the inventors are:

“1. A method comprising: in response to determining, by a computing device, there is permission to monitor a location of a user, monitoring the location of the user to generate location data; generating, by the computing device and based on identity data associated with the user that includes the location data, an identity token for the user; in response to authenticating, by the computing device, the user based on the identity token, generating, by the computing device, an activity token for the user; based on a determination that a number of other computing devices verifying the activity token is above a threshold number of computing devices, storing, by the computing device, the activity token for the user in an activity chain, wherein the activity token for the user indicates a prior activity token stored in the activity chain; and transmitting, by the computing device and to the other computing devices, an indication of the storing the activity token.

“2. The method of claim 1, further comprising: determining previous activities performed by the user; and determining a level of activity for the user based on the previous activities.

“3. The method of claim 2, wherein the activity token is generated based on a determination that activity meets the level of activity.

“4. The method of claim 1, wherein the activity token is generated by cryptographically combining previous activity data associated with the user.

“5. The method of claim 1, further comprising: encrypting the activity token.

“6. The method of claim 5, further comprising: transmitting, by the computing device and to the other computing devices, a corresponding public key.

“7. The method of claim 1, wherein the computing device and the other computing devices form a network of trusted computing devices.

“8. A computing device comprising: a processor; and memory storing computer-executable instructions that, when executed by the processor, cause the computing device to: in response to determining there is permission to monitor activity of a device of a user, monitor the activity of the device to generate device activity data, generate, based on identity data associated with the user that includes the device activity data, an identity token for the user, in response to authenticating the user based on the identity token, generate an activity token for the user, based on a determination that a number of other computing devices verifying the activity token is above a threshold number of computing devices, store the activity token for the user in an activity chain, wherein the activity token for the user indicates a prior activity token stored in the activity chain, and transmit to the other computing devices an indication of the storing the activity token.

“9. The computing device of claim 8, wherein the memory stores computer-executable instructions that, when executed by the processor, causes the computing device to determine previous activities performed by the user; and determine a level of activity for the user based on the previous activities.

“10. The computing device of claim 9, wherein the activity token is generated based on a determination that activity meets the level of activity.

“11. The computing device of claim 9, wherein the computing device and the other computing devices form a network of trusted computing devices.

“12. The computing device of claim 8, wherein the activity token is generated by cryptographically combining previous activity data associated with the user.

“13. The computing device of claim 8, wherein the memory stores computer-executable instructions that, when executed by the processor, causes the computing device to: encrypt the activity token.

“14. The computing device of claim 13, wherein the memory stores computer-executable instructions that, when executed by the processor, causes the computing device to: transmit, to the other computing devices, a corresponding public key.

“15. The computing device of claim 8, wherein the computing device and the other computing devices form a network of trusted computing devices.

“16. A system comprising: a computing device; and a plurality of other computing devices, wherein the computing device is configured to: in response to determining there is permission to monitor a location of a user, monitor the location of the user to generate location data, in response to determining there is permission to monitor activity of a device of the user, monitor the activity of the device to generate device activity data, generate, based on identity data associated with the user that includes the location data and the device activity data, an identity token for the user, in response to authenticating the user based on the identity token, generate an activity token for the user, based on a determination that a number of other computing devices verifying the activity token is above a threshold number of computing devices, store the activity token for the user in an activity chain, wherein the activity token for the user indicates a prior activity token stored in the activity chain, and transmit to the other computing devices an indication of the storing the activity token.

“17. The system of claim 16, wherein the computing device is configured to: determine previous activities performed by the user; and determine a level of activity for the user based on the previous activities, wherein the activity token is generated based on a determination that activity meets the level of activity.

“18. The system of claim 16, wherein the activity token is generated by cryptographically combining previous activity data associated with the user.

“19. The system of claim 16, wherein the computing device is configured to: encrypt the activity token.

“20. The system of claim 16, wherein the computing device and the other computing devices form a network of trusted computing devices.”

URL and more information on this patent, see: Hayes, Howard. Cryptographically transmitting and storing identity tokens and/or activity data among spatially distributed computing devices. U.S. Patent Number 11757862, filed July 19, 2022, and published online on September 12, 2023. Patent URL (for desktop use only): https://ppubs.uspto.gov/pubwebapp/external.html?q=(11757862)&db=USPAT&type=ids

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Patent Issued for Virtual environment generation for collaborative building assessment (USPTO 11758090): State Farm Mutual Automobile Insurance Company

Newer

Patent Issued for Complex composite tokens (USPTO 11758406): eBay Inc.

Advisor News

  • Addressing the ‘menopause tax:’ A guide for advisors with female clients
  • Alternative investments in 401(k)s: What advisors must know
  • The modern advisor: Merging income, insurance, and investments
  • Financial shocks, caregiving gaps and inflation pressures persist
  • Americans unprepared for increased longevity
More Advisor News

Annuity News

  • Globe Life Inc. (NYSE: GL) Making Surprising Moves in Monday Session
  • Aspida Life and WealthVest Offer a Powerful New Guaranteed Income Product with the WealthLock® Income Builder
  • Lack of digital tools drives wedge between insurers, advisors
  • LIMRA: Annuity sales notch 10th consecutive $100B+ quarter
  • AIG to sell remaining shares in Corebridge Financial
More Annuity News

Health/Employee Benefits News

  • Studies from Denise Wolff et al Have Provided New Data on Atopic Dermatitis (AMCP Market Insights: Beyond skin deep on the role of managed care in moderate to severe atopic dermatitis): Skin Diseases and Conditions – Atopic Dermatitis
  • New Clinical Trials and Studies Findings from RAND Corporation Described (Benefit design and consumer information: results from a randomized trial): Clinical Research – Clinical Trials and Studies
  • School, BOCES healthcare costs up 22%, here’s why
  • Healthcare cuts threaten Sullivan's reelection chances in Alaska
  • Health insurance marketplace feels growing tremors from GOP cuts
More Health/Employee Benefits News

Life Insurance News

  • Globe Life Inc. (NYSE: GL) Making Surprising Moves in Monday Session
  • Dan Scholz to receive NAIFA’s Terry Headley Lifetime Defender Award
  • Best’s Special Report: US Property/Casualty and Health Insurers Exceed Cost of Capital; Life Insurers Narrowly Miss
  • Aspida Life and WealthVest Offer a Powerful New Guaranteed Income Product with the WealthLock® Income Builder
  • Lack of digital tools drives wedge between insurers, advisors
More Life Insurance News

- Presented By -

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Why Blend in When You Can Make a Splash?
Pacific Life’s registered index-linked annuity offers what many love about RILAs—plus more!

Life moves fast. Your BGA should, too.
Stay ahead with Modern Life's AI-powered tech and expert support.

Bring a Real FIA Case. Leave Ready to Close.
A practical working session for agents who want a clearer, repeatable sales process.

Discipline Over Headline Rates
Discover a disciplined strategy built for consistency, transparency, and long-term value.

Inside the Evolution of Index-Linked Investing
Hear from top issuers and allocators driving growth in index-linked solutions.

Press Releases

  • Sequent Planning Recognized on USA TODAY’s Best Financial Advisory Firms 2026 List
  • Highland Capital Brokerage Acquires Premier Financial, Inc.
  • ePIC Services Company Joins wealth.com on Featured Panel at PEAK Brokerage Services’ SPARK! Event, Signaling a Shift in How Advisors Deliver Estate and Legacy Planning
  • Hexure Offers Real-Time Case Status Visibility and Enhanced Post-Issue Servicing in FireLight Through Expanded DTCC Partnership
  • RFP #T01325
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet