IDENTIFICATION AUTHENTICATION METHODS AND SYSTEMS
First Claim
1. An identification authentication system comprising:
- a first device networked to a second device so that the first device can communicate with the second device, the first device being adapted to receive a first set of user information and communicate the first set of user information to the second device;
the second device being adapted to generate a security token in response to the first set of user information and provide the security token to the first device for user review, the security token comprising token information; and
the first device being adapted to receive a second set of user information so that a user can dynamically decrypt the security token in substantially real time to access the token information to authenticate the second device.
0 Assignments
0 Petitions
Accused Products
Abstract
Identification authentication methods and systems are provided. In accordance with some embodiments, a user can verify or authenticate an item to ensure if the item is authentic by utilizing a security token. For example, a user can authenticate a website to determine if the website is authentic by providing information to decrypt a security token, and the user can determine if the website is authentic by reviewing the decrypted security token. An authentication method between a user and a service provider can comprise generating a security token, presenting the security token to a user, decrypting the security token, and receiving user information to authenticate a user. The security token can based at least partially on user information, and can comprise encrypted token information. Decrypting the security token can occur dynamically in real time so the token information appears enabling a user to authenticate a service provider. Other embodiments are also claimed and described.
125 Citations
20 Claims
-
1. An identification authentication system comprising:
-
a first device networked to a second device so that the first device can communicate with the second device, the first device being adapted to receive a first set of user information and communicate the first set of user information to the second device;
the second device being adapted to generate a security token in response to the first set of user information and provide the security token to the first device for user review, the security token comprising token information; and
the first device being adapted to receive a second set of user information so that a user can dynamically decrypt the security token in substantially real time to access the token information to authenticate the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An identification authentication method comprising:
-
generating an encrypted token comprising user information;
receiving information from a user to access the user information from the encrypted token; and
using the received information to decrypt the encrypted token in substantially real time so that a user can authenticate an identity associated with a communication. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. An authentication method between a user and a service provider comprising:
-
generating a security token based at least partially on user information, the security token comprising encrypted token information;
presenting the security token to a user;
decrypting the security token in substantially real time so that during decryption the token information is dynamically presented to a user so that a user utilizes the decrypted security token to authenticate a service provider; and
receiving information from a user so that a service provider can authenticate the user. - View Dependent Claims (18, 19, 20)
-
Specification