×

Systems and methods for authenticating user identities in networked computer systems

  • US 10,496,988 B2
  • Filed: 06/23/2015
  • Issued: 12/03/2019
  • Est. Priority Date: 06/23/2014
  • Status: Active Grant
First Claim
Patent Images

1. A terminal device, comprising:

  • a communications interface;

    a memory storing software instructions; and

    one or more processors coupled to the memory and to the communications unit, the one or more processors being configured to execute the software instructions to perform one or more operations, the operations comprising;

    receiving authentication data from a client device via the communications interface, the authentication data comprising an authentication code corresponding to an exchange of data initiated between the client device and a first computing system and a first portion of authentication information associated with the initiated data exchange, and the first portion of the authentication information comprising packetized data that includes a header or a footer portion;

    based on the authentication code, determining a transaction type that characterizes the initiated data exchange, and obtaining a second portion of the authentication information associated with the determined transaction type;

    detecting an incompatibility between the first portion of the authentication information and the transaction type;

    in response to the detected incompatibility, modifying a format of the header or footer portion of the first portion of the authentication information in accordance with the transaction type;

    generating modified authentication data that includes the first and second portions of the authentication information; and

    transmitting, via the communications interface, the modified authentication data to a second computing system,wherein the second computing system is configured to validate the initiated data exchange based on a comparison between the modified authentication data and validation data characterizing a prior authentication transaction validated by the second computing system, and to generate and transmit, to the first computing system, validation information characterizing the validated data exchange, andwherein the first computing system is configured to execute the initiated data exchange based on the validation information.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×