×

Systems and methods to authenticate users and/or control access made by users on a computer network using identity services

  • US 10,356,099 B2
  • Filed: 02/02/2018
  • Issued: 07/16/2019
  • Est. Priority Date: 05/13/2016
  • Status: Active Grant
First Claim
Patent Images

1. A controller for user authentication and access control, the controller comprising:

  • at least one microprocessor;

    a network interface controlled by the at least one microprocessor to communicate over a computer network with;

    at least one computing site, and at least one identity service, wherein the identity service stores identification information of a user and is configured to communicate with the user for identity protection; and

    memory coupled with the at least one microprocessor and storing;

    graph data representing a graph having;

    nodes representing data associated with access tokens used in connecting to a network, andlinks among the nodes representing connections between the data elements derived from the data associated with the access tokens; and

    instructions which, when executed by the at least one microprocessor, cause the controller to;

    receive, from the computing site, input data specifying details of an access made using a new access token;

    determine, from the input data;

    a device identity representing a user device from which the access is made using the new access token, and a user identity representing the user who uses the user device to make the access using the new access token;

    update the graph according to the input data, the updating the graph comprising inserting a new node into the graph using the device identity or user identity and connecting the new node to an existing node in the graph via a new connection and based on data associated with the new access token;

    transmit a query over the network to the identity service, the query causing the identity service to verify association of data elements corresponding to the connection identified in the graph;

    receive, over the network and from the identity service, a validation responsive to the query; and

    process, based on the validation, the access made using the new access token.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×