Multiple party benefit from an online authentication service
First Claim
1. A method for a value-adding party to interact with an online authentication system wherein the identity of a presenter is authenticated during an online transaction by a trusted party, said method comprising:
- receiving an identity authenticating password from said presentor;
comparing said identity authenticating password against a password previously designated for an account of said presenter;
notifying a requestor that said presentor is the actual owner of said account when said identity authenticating password received from said presentor matches the password that was previously designated for said account, whereby said trusted party authenticates for the benefit of said requestor that said presentor is the actual owner of said account; and
sending presentor information to said value-adding party.
1 Assignment
0 Petitions
Accused Products
Abstract
An account authentication service where a trusted party verifies an account holder'"'"'s identity for the benefit of a requestor during an online transaction. The account authentication involves requesting a password from the account holder, verifying the password, and notifying the requestor whether the account holder'"'"'s authenticity has been verified. An alternative embodiment of the account authentication service includes a value-adding component where information about a customer is shared with a value-adding party. The customer information is rich in detail about the customer since it is collected by each of the parties in the account authentication process. The value-adding party can then use this information in various manners. All of the parties involved can benefit from sharing the customer information. The value-adding party can be, for example, a merchant, a shipper, a security organization, or a governmental organization. A transaction identifier identifies a specific transaction between a customer, a merchant, and the customer information.
324 Citations
51 Claims
-
1. A method for a value-adding party to interact with an online authentication system wherein the identity of a presenter is authenticated during an online transaction by a trusted party, said method comprising:
-
receiving an identity authenticating password from said presentor;
comparing said identity authenticating password against a password previously designated for an account of said presenter;
notifying a requestor that said presentor is the actual owner of said account when said identity authenticating password received from said presentor matches the password that was previously designated for said account, whereby said trusted party authenticates for the benefit of said requestor that said presentor is the actual owner of said account; and
sending presentor information to said value-adding party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for a shipper to interact with an online authentication system wherein the identity of a customer is authenticated during an online transaction by a trusted party, said method comprising:
-
receiving an identity authenticating password from said customer;
comparing said identity authenticating password against a password previously designated for an account of said customer;
notifying a requestor that said customer is the actual owner of said account when said identity authenticating password received from said customer matches the password that was previously designated for said account, whereby said trusted party authenticates for the benefit of said requester that said customer is the actual owner of said account;
sending customer information to said shipper; and
shipping a purchased product to said customer. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A method for a security organization to interact with an online authentication system wherein the identity of a presenter is authenticated during an online transaction by a trusted party, said method comprising:
-
receiving an identity authenticating password from said presentor;
comparing said identity authenticating password against a password previously designated for an account of said presenter;
notifying a requester that said presentor is the actual owner of said account when said identity authenticating password received from said presentor matches the password that was previously designated for said account, whereby said trusted party authenticates for the benefit of said requestor that said presentor is the actual owner of said account; and
sending presentor information to said security organization. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
Specification