Digital credential usage reporting
First Claim
1. A method comprising:
- receiving a request to verify a use of a digital credential by a user of a digital credential, the digital credential being a digital security mechanism associated with a user'"'"'s identity, the use occurring at a first of a plurality of different services where the digital credential can be used;
verifying the use of the digital credential in response to receipt of the request to verify;
sending a result of the verification to the first service;
storing the result of the verification in an activity log in a central service that communicates with each of said plurality of different services; and
allowing specified users to access said result.
1 Assignment
0 Petitions
Accused Products
Abstract
An credential verification service (CVS) authenticates digital credentials, such as, digital certificates, at the request of online service providers. The CVS stores the authentication results and transaction information in a central activity log. The transaction information can include a size of the transaction, the online service requesting the authentication, an internet protocol (IP) address of a computing device originating the transaction and the goods or services involved in the transaction. The CVS generates an activity report from the activity log that lists the authentication results and the transaction information. A fraud detection module within the CVS analyzes the activity log to identify any unusual patterns in order to identify fraudulent activities or general misuse of the digital credential.
-
Citations
39 Claims
-
1. A method comprising:
-
receiving a request to verify a use of a digital credential by a user of a digital credential, the digital credential being a digital security mechanism associated with a user'"'"'s identity, the use occurring at a first of a plurality of different services where the digital credential can be used;
verifying the use of the digital credential in response to receipt of the request to verify;
sending a result of the verification to the first service;
storing the result of the verification in an activity log in a central service that communicates with each of said plurality of different services; and
allowing specified users to access said result. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An article comprising a computer-readable medium having computer-executable instructions stored thereon for causing a computer to:
-
receive a request to verify a use of a digital credential by a user of a digital credential at any of a plurality of different services where the digital credential can be used, the digital credential being a digital security mechanism associated with a user'"'"'s identity;
verify the use of the digital credential in response to receipt of the request to verify from a first service of the plurality of different services;
send a result of the verification to the first service;
store a result of the verification in an activity log in a central service that communicates with each of said plurality of different services; and
allow specified users to access said result. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system comprising:
-
a server to receive requests to verify digital credentials by a user of a digital credential at any of a plurality of different services where the digital credential can be used, to verify the use of the digital credential in response to receipt of requests, and to send results from the verifications to the services;
an activity log coupled to the server to store the results from the verifications in a central service that communicates with each of said plurality of different services; and
a communication part to allow specified users to access said results. - View Dependent Claims (24, 25, 26)
-
-
27. An article comprising a computer-readable medium having data structures stored thereon comprising:
-
a first data field to store a result from an verification of a digital credential by a user of a digital credential at any of a plurality of different services where the digital credential can be used;
a plurality of data fields to store transaction information relating to each verification result in a central service that communicates with each of said plurality of different services; and
a data access structure, allowing specified users to access said results. - View Dependent Claims (28, 29)
-
-
30. A method comprising:
-
storing use information for a digital credential of a plurality of delegates who are delegated to use said digital credential by an owner, the digital credential being a digital security mechanism associated with the owner'"'"'s identity;
processing the use information for each of said plurality of delegates to detect misuse; and
generating an alert to the owner based on the detection of misuse. - View Dependent Claims (31, 32, 33, 34, 35)
-
-
36. A method comprising:
-
receiving a request from a medical professional to access medical information at a remote service, wherein the request includes a digital credential for the medical professional, the digital credential being a digital security mechanism associated with the medical professional'"'"'s identity;
communicating transaction information describing the access request and the digital credential to a credential verification service;
receiving a verification result from the credential verification service;
providing the medical professional access to the medical information based on the verification result; and
receiving an activity report from the credential verification service, wherein the activity report lists the transaction information, the digital credential and the transaction result. - View Dependent Claims (37, 38, 39)
-
Specification