Brent Williams
Arlington, Virginia, United States
4K followers
500+ connections
About
FinTech (payments, compliance)
Continuous Identity Risk…
Articles by Brent
-
Advice for Gen Z on Job Hunting: From 8-Track Tapes to Instagram
Advice for Gen Z on Job Hunting: From 8-Track Tapes to Instagram
By Brent Williams
Activity
-
I am pleased to announce that Junaid Husain has been appointed as the permanent CEO of Greater Houston Healthconnect. Junaid brings with him a wealth…
I am pleased to announce that Junaid Husain has been appointed as the permanent CEO of Greater Houston Healthconnect. Junaid brings with him a wealth…
Liked by Brent Williams
-
United States Marine Corps Warrior Rescue (501c3 Nonprofit) repost : The other day that I posted about K9 Kitt being killed in the line of duty my…
United States Marine Corps Warrior Rescue (501c3 Nonprofit) repost : The other day that I posted about K9 Kitt being killed in the line of duty my…
Liked by Brent Williams
-
Any CEO would feel honored to have Scott Sanner as an advisor. Scott is the current CEO of Millennia, a technology-driven patient pay and engagement…
Any CEO would feel honored to have Scott Sanner as an advisor. Scott is the current CEO of Millennia, a technology-driven patient pay and engagement…
Liked by Brent Williams
Experience & Education
Patents
-
System and Method for Strong Remote Identity Proofing
Issued US 10,284,548
When confirming to a very high level of confidence that the asserted electronic identity is that of the actual individual, the individual conducting the electronic identity proofing shall assert an identity by providing the biographical details of their identity including, but not limited to their legal name, date of birth, and address. The system will query data repositories with the biographical data provided. These data repositories include, but are not limited to, existing enterprise…
When confirming to a very high level of confidence that the asserted electronic identity is that of the actual individual, the individual conducting the electronic identity proofing shall assert an identity by providing the biographical details of their identity including, but not limited to their legal name, date of birth, and address. The system will query data repositories with the biographical data provided. These data repositories include, but are not limited to, existing enterprise records, public data sources, vendors who aggregate public data, and credit bureaus. This embodiment provides the method for meeting the three key process steps 1) validating the government issued identity, 2) validating the account number, and 3) confirming the address supplied in the records in real time. Additionally, this embodiment provides for additional knowledge-based questions from the data gathering process to be presented to further confirm the identity.
The present embodiment gathers variable amounts and qualities of data on the individual. Once gathered it then determines if it is capable of conducting the identity proofing based upon the data available. If so, it combines a set of graphical user interfaces as well as questions and answers to facilitate real-time implementation of this standard. -
System and Methods for Exchanging Identity Information among independent Enterprises which May Include Person Enabled Correlation
Issued US 10,049,230
A system and method for exchanging identity information and for correlating protected data across independent data systems connected through a network. The system contains connectors in communication with protected data systems which house the protected data. Data is correlated between the protected data systems through coincident authentication of both systems by a user. Messages are exchanged which allow the identity exchange system to correlate data based on a session identifier from an…
A system and method for exchanging identity information and for correlating protected data across independent data systems connected through a network. The system contains connectors in communication with protected data systems which house the protected data. Data is correlated between the protected data systems through coincident authentication of both systems by a user. Messages are exchanged which allow the identity exchange system to correlate data based on a session identifier from an authenticated session on one of the protected data systems.
-
System and Methods for Exchanging Identity Information among Independent Enterprises
Issued US 9,705,870
A system and method for exchanging identity information and for correlating protected data across independent data systems connected through a network is disclosed. The system contains connectors in communication with protected data systems which house the protected data. Edge servers in communication with the connectors store correlation data sets that correlate protected data records using permanent tokens generated by the connectors. Root servers in communication with the edge servers store…
A system and method for exchanging identity information and for correlating protected data across independent data systems connected through a network is disclosed. The system contains connectors in communication with protected data systems which house the protected data. Edge servers in communication with the connectors store correlation data sets that correlate protected data records using permanent tokens generated by the connectors. Root servers in communication with the edge servers store identity correlations generated by the root servers and propagated to the edge servers. Data identifiers used in the protected data system are correlated with distinct data identifiers used in the edge and root servers. The correlations are propagated throughout the edge servers so that each data system can transfer data to another data system without using the protected data identifiers.
Other inventorsSee patent -
System and Methods for Exchanging Identity Information among Independent Enterprises which May Include Person Enabled Correlation
Issued US 9,699,160
A system and method for exchanging identity information and for correlating protected data across independent data systems connected through a network is disclosed. The system contains connectors in communication with protected data systems which house the protected data. Data is correlated between the protected data systems through coincident authentication of both systems by a user. Messages are exchanged which allow the identity exchange system to correlate data based on a session identifier…
A system and method for exchanging identity information and for correlating protected data across independent data systems connected through a network is disclosed. The system contains connectors in communication with protected data systems which house the protected data. Data is correlated between the protected data systems through coincident authentication of both systems by a user. Messages are exchanged which allow the identity exchange system to correlate data based on a session identifier from an authenticated session on one of the protected data systems.
Other inventorsSee patent -
System and Method for Providing Consent Management
Issued US 9,621,357
A system and method for managing consent for an enterprise to, for example, provide access to controlled data to another enterprise wherein the controlled data can be in the form of subject data records. The system includes a consent management module operative to associate a plurality of control levels with a subject data record and process a consent request requesting access to the controlled data. Access is determined based on the control levels associated with a subject of the controlled…
A system and method for managing consent for an enterprise to, for example, provide access to controlled data to another enterprise wherein the controlled data can be in the form of subject data records. The system includes a consent management module operative to associate a plurality of control levels with a subject data record and process a consent request requesting access to the controlled data. Access is determined based on the control levels associated with a subject of the controlled data, a requesting operator, and/or the controlled data itself, A control level data set comprising the control levels for use in controlling access to the controlled data and/or subject data records is stored in a database.
Other inventorsSee patent -
Out of Band System and Method for Authentication
Issued US 8,296,562
Systems and methods for using out-of-band authentication to confirm the asserted electronic identity of an individual and control the release of a cryptographic key are disclosed herein. When confirming to a very high level of confidence that the asserted electronic identity is that of registered to the individual, these confirm that a person conducting a transaction is who she claims she is by confirming first, something she knows, using a username and password (or username only) as a shared…
Systems and methods for using out-of-band authentication to confirm the asserted electronic identity of an individual and control the release of a cryptographic key are disclosed herein. When confirming to a very high level of confidence that the asserted electronic identity is that of registered to the individual, these confirm that a person conducting a transaction is who she claims she is by confirming first, something she knows, using a username and password (or username only) as a shared knowledge token, and; confirming second, something she has, the item registered to him; and third, confirming the fact that she has control over that item. Once each of these confirmations is established, a cryptographic key may be released by the out-of-band authentication process. The cryptographic key released will either be specific to the individual or will be specific to the system that actually releases the key. If the system releases a key that is not specific to the individual, the association with the individual who authenticated the release of the key, thereby establishing non-repudiation of the key, shall be provided by association of the specific transmission of the system key with the unique authentication transaction through auditable logging. The cryptographic key released by the out-of-band authentication may be either symmetric or asymmetric, that is, one key may be used to generate a message authentication code and to verify the code, or two related keys, a public key and a private key, may be used for signature generation and signature verification, respectfully.
The methods and systems disclosed herein can be used for any sensitive online transaction in which strong assurance of the asserted and the actual electronic identity of the end-user is required. This includes, but is not limited to, electronic government, healthcare, banking, and commercial transactions performed on a network infrastructure including the WWW.
Languages
-
French
-
Organizations
-
Boy Scouts of America
-
- -
IT Sector Coordination Council (IT-SCC)
Member, Elected Officer
- -
Embassy Series
Board Member
-
Recommendations received
18 people have recommended Brent
Join now to viewMore activity by Brent
-
An exciting and informative visit today to Intermountain Health's Lutheran Hospital. A beautiful new facility opening in 30 days to serve the Greater…
An exciting and informative visit today to Intermountain Health's Lutheran Hospital. A beautiful new facility opening in 30 days to serve the Greater…
Liked by Brent Williams
-
After 4 more unforgettable years, my time at ID.me has come to an end. I’m incredibly thankful to Blake Hall, and Tanel Suurhans for giving me the…
After 4 more unforgettable years, my time at ID.me has come to an end. I’m incredibly thankful to Blake Hall, and Tanel Suurhans for giving me the…
Liked by Brent Williams
-
In less than 2 years, CLEAR took an idea of solving for fragmented identity in the U.S. healthcare system and made it a reality. For so long…
In less than 2 years, CLEAR took an idea of solving for fragmented identity in the U.S. healthcare system and made it a reality. For so long…
Liked by Brent Williams
-
Hi everyone! I’ve moved on from a rewarding few years at EML, taken a few weeks break, and I am now looking for new challenges & opportunities. I’m…
Hi everyone! I’ve moved on from a rewarding few years at EML, taken a few weeks break, and I am now looking for new challenges & opportunities. I’m…
Liked by Brent Williams
-
Ad Hoc has a new face on our executive team - Brian Michl has joined as our Chief Operating Officer. Like Ad Hoc’s co-founders, Brian began his…
Ad Hoc has a new face on our executive team - Brian Michl has joined as our Chief Operating Officer. Like Ad Hoc’s co-founders, Brian began his…
Liked by Brent Williams
-
Looking forward to connecting with fellow professionals at the #GartnerSecuritySummit in #WashingtonDC! Excited to learn from top experts and gain…
Looking forward to connecting with fellow professionals at the #GartnerSecuritySummit in #WashingtonDC! Excited to learn from top experts and gain…
Liked by Brent Williams
People also viewed
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Brent Williams in United States
-
Brent Williams
-
Brent Williams
-
Brent Williams
That single onion ring didn't end up in your french fries by accident. It's Burger King's way of flirting with you.
-
Brent Williams
638 others named Brent Williams in United States are on LinkedIn
See others named Brent Williams