Centralized identity authentication for electronic communication networks
First Claim
1. A method of centralized identity authentication over a communications network, comprising:
- receiving registration data by a server, the registration data including authentication data for a user and a vendor, the user engaging in a transaction with the vendor, the transaction including the vendor providing the user access to data maintained by the vendor, and the server being remote from the user and the vendor;
receiving authentication data from the user and the vendor by the server over the communications network; and
authenticating identities of the user and the vendor by the server over the communications network prior to completion of the transaction, the authenticating including comparing the received authentication data with the authentication data of the received registration data;
wherein authenticating further includes;
receiving a dynamically changing password from at least one of;
an issued hardware token;
ora software object.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of centralized identity authentication for use in connection with a communications network includes registering users of the communications network such that each registered user'"'"'s identity is uniquely defined and determinable, and registering a plurality of vendors having a presence on the communications network. The registered vendors selectively transact with registered users, wherein the transactions include: (i) the registered vendor selling goods and/or services to the registered user; (ii) the registered vendor granting the registered user access to personal records maintained by the registered vendor; and/or (iii) the registered vendor communicating to the registered user personal information maintained by the registered vendor. The method also includes each user'"'"'s identity being authenticated over the communications network prior to completion of transactions between registered vendors and registered users.
-
Citations
26 Claims
-
1. A method of centralized identity authentication over a communications network, comprising:
-
receiving registration data by a server, the registration data including authentication data for a user and a vendor, the user engaging in a transaction with the vendor, the transaction including the vendor providing the user access to data maintained by the vendor, and the server being remote from the user and the vendor; receiving authentication data from the user and the vendor by the server over the communications network; and authenticating identities of the user and the vendor by the server over the communications network prior to completion of the transaction, the authenticating including comparing the received authentication data with the authentication data of the received registration data; wherein authenticating further includes; receiving a dynamically changing password from at least one of; an issued hardware token;
ora software object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system of centralized identity authentication over a communications network, comprising:
a server of an authentication authority remote from a user, a trusted representative and a vendor, the server configured to; receive registration data for the trusted representative from the trusted representative over the communication network, the registration data including authentication data for the user; receive registration data including authentication data the vendor, the vendor engaging in a transaction with the user, the transaction including the vendor granting the user access to personal data of the user maintained by the vendor; receive authentication data from the user and the vendor over the communications network; authenticate identities of the user and the vendor over the communications network prior to completion of the transaction, the authentication including comparing the received authentication data with the authentication data of the received registration data; and receive a dynamically changing password from at least one of; an issued hardware token;
ora software object. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
21. A method of centralized identity authentication over a communications network, comprising:
-
authenticating, with a configured server, identities of a registered user and a registered vendor over the communications network prior to completion of a transaction between the registered user and the registered vendor; notifying, with the configured server, the registered user of a non-authentic user attempt of the transaction with the registered vendor posing as the registered user; receiving registration data by the server, the registration data including authentication data for the registered user and the registered vendor, the registered user engaging in a transaction with the registered vendor, the transaction including the vendor providing the registered user access to data maintained by the registered vendor; and receiving authentication data from the registered user and the registered vendor by the server over the communications network; wherein the authenticating includes comparing the received authentication data with the authentication data of the received registration data. - View Dependent Claims (22)
-
-
23. A method of centralized identity authentication over a communications network, comprising:
-
authenticating, with a configured server, identities of a registered user and a registered vendor over the communications network prior to completion of a transaction between the registered user and the registered vendor; and notifying, with the configured server, the registered user of a non-authentic user attempt of the transaction with the registered vendor posing as the registered user; wherein authenticating further includes receiving a dynamically changing password from an issued hardware token.
-
-
24. A method of centralized identity authentication over a communications network, comprising:
-
authenticating, with a configured server, identities of a registered user and a registered vendor over the communications network prior to completion of a transaction between the registered user and the registered vendor; and notifying, with the configured server, the registered user of a non-authentic user attempt of the transaction with the registered vendor posing as the registered user; wherein authenticating further includes receiving a dynamically changing password from a software object. - View Dependent Claims (25, 26)
-
Specification