Methods For Authentication
First Claim
1. A method for generating an authentication passkey for a resource associated with a computer system, said method comprising the steps of:
- providing a user account identifier for the resource to an authentication component of the computer system;
providing an identifying data element to the authentication component; and
encrypting the user account identifier by using the identifying data element as the key to encryption.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for managing access to application software contained on a computer system or network. The computer system utilizes an authentication component that is configured to receive a unique user account identifier and to generate an authentication passkey by using an identifying data element, typically called a “password”. The identifying data elements are collected from one or more input devices and used as an encryption key for the user account identifier. The generated authentication passkey is used in an authentication transaction associated with the application software instead of the identifying data element thereby reducing data security risks if the identifying data element alone were discovered due to other unknowns including the encryption elements.
-
Citations
28 Claims
-
1. A method for generating an authentication passkey for a resource associated with a computer system, said method comprising the steps of:
-
providing a user account identifier for the resource to an authentication component of the computer system; providing an identifying data element to the authentication component; and encrypting the user account identifier by using the identifying data element as the key to encryption. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of generating and registering an authentication passkey for application software associated with a computer system, said method comprising the steps of:
-
providing a user account identifier for the application software to an authentication component of the computer system; providing an identifying data element to the authentication component through a mechanism associated the computer system; encrypting the user account identifier by using the identifying data element as the key to encryption for generating the passkey; determining if an authorization database contains a registration record associated with the user account identifier; and updating an application authentication database to contain the generated passkey associated with the user account identifier if no registration record for the user account identifier is located. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method for registering a payment passkey with a payment system network comprising the steps of:
-
providing the payment system with a user'"'"'s proof of identity; providing the user a user account identifier and a payment method identifier in response to receiving the proof of identity; providing the payment system with an identifying element; generating a payment passkey by encrypting the combination of the user account identifier and payment method identifier utilizing the identifying element; and
registering the generated payment passkey in the payment system network. - View Dependent Claims (20)
-
-
21. A method for registering an application service identifier utilizing a service authentication component, said method comprising the steps of:
-
generating a user service identifier upon initiating a session of using application software; providing an application identifier and the user service identifier to a service authentication component; and storing the application identifier and the user service identifier in the service authentication component. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A method for generating an authentication passkey for a resource, said method comprising the steps of:
-
providing a resource identifier to the authentication component; providing an identifying data element to the authentication component; and encrypting the resource identifiers by using the identifying data element as the key to encryption. - View Dependent Claims (27, 28)
-
Specification