Steganographic authentication
First Claim
Patent Images
1. A computer-implemented authentication method comprising:
- defining an authentication network having a plurality of authentication paths;
receiving communication from an identity that is to be authenticated, the communication having a purpose that appears to be unrelated to authentication;
using the communication from the identity to follow an authentication path through the authentication network; and
authenticating the identity if the authentication path leads to a valid authentication state for the identity, wherein said acts of receiving, using and authenticating are performed independent of any encryption/decryption procedures.
1 Assignment
0 Petitions
Accused Products
Abstract
Various embodiments pertain to steganographically authenticating identities and authorizing transactions based on the authenticated identities.
-
Citations
20 Claims
-
1. A computer-implemented authentication method comprising:
-
defining an authentication network having a plurality of authentication paths;
receiving communication from an identity that is to be authenticated, the communication having a purpose that appears to be unrelated to authentication;
using the communication from the identity to follow an authentication path through the authentication network; and
authenticating the identity if the authentication path leads to a valid authentication state for the identity, wherein said acts of receiving, using and authenticating are performed independent of any encryption/decryption procedures. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented authentication method comprising:
-
receiving communication from an identity that is to be authenticated, the communication comprising content which is in the clear and which appears unrelated to authentication, said communication also comprising content that is false cryptographic content;
using the content of said communication to authenticate an identity. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. One or more computer-readable media having computer-readable instructions thereon which, when executed, perform a method comprising:
-
receiving communication from an identity that is to be authenticated, the communication comprising content which is in the clear and which appears unrelated to authentication, said communication also comprising content that is false cryptographic content;
using the content of said communication to authenticate an identity. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification