Identity theft mitigation
First Claim
1. An authentication method comprising:
- providing a declaration of adoption of public-key authentication for account creation;
providing a public key of a public key-private key cryptographic key pair;
requesting to establish an account based on said public-key authentication, wherein at least a portion of said request is signed with a private of said key pair;
receiving notification that said account is one of authorized and not authorized; and
providing a disclaimer of liability resulting from a transaction conducted based on fact based authentication.
2 Assignments
0 Petitions
Accused Products
Abstract
Public-key authentication, based on public key cryptographic techniques, is utilized to authenticate a person opening an account. The person provides a declaration to use only public-key authentication and a copy of his/her public key to an authorized agent, such as a credit bureau. The person provides a signed request to open an account with a merchant based on public-key authentication. This merchant requests a credit report from the credit bureau, providing the credit bureau the applicant'"'"'s public key. The credit bureau uses the public key to locate a credit report. Barring theft of the user'"'"'s private key, the credit report will be that of the requesting user with a high probability. The credit bureau can then provide the requested information to the merchant, and the merchant can provide notification to the person that the account is authorized or not, based on what the merchant reads in the credit report.
-
Citations
20 Claims
-
1. An authentication method comprising:
-
providing a declaration of adoption of public-key authentication for account creation;
providing a public key of a public key-private key cryptographic key pair;
requesting to establish an account based on said public-key authentication, wherein at least a portion of said request is signed with a private of said key pair;
receiving notification that said account is one of authorized and not authorized; and
providing a disclaimer of liability resulting from a transaction conducted based on fact based authentication. - View Dependent Claims (3, 4, 6)
-
-
2. (canceled)
-
5. A method in accordance with claim 5, wherein:
-
said first entity comprises a credit bureau; and
said second entity comprises a merchant.
-
-
7. An authentication method comprising:
-
receiving a declaration of adoption of public-key authentication;
receiving a public key of a public key-private key cryptographic key pair;
receiving a request to establish an account based on said public-key authentication, wherein at least a portion of said request is signed utilizing a private key of said key pair, determining an authenticity of said request;
providing a notification that said account is one of authorized and not authorized; and
receiving a disclaimer of liability resulting from a transaction conducted based on fact based authentication. - View Dependent Claims (8, 10, 11, 12, 13)
-
-
9. (canceled)
-
14. A authentication system comprising
a processing portion for: -
generating a public key-private key cryptographic key pair comprising a public key and a private key;
a memory portion for storing said public key and said private key; and
an input/output portion for;
providing a declaration of adoption of public-key authentication for account creation;
providing said public key of said public key-private key pair;
providing a request to establish, utilizing said private key of said key pair, an account based on said public-key authentication;
receiving notification that said account is one of authorized and not authorized; and
providing a disclaimer of liability resulting from a transaction conducted based on fact based authentication. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
15. (canceled)
Specification