METHODS AND APPARATUS FOR TRANSACTING WITH MULTIPLE DOMAINS BASED ON A CREDENTIAL
First Claim
1. An apparatus, comprising:
- a memory configured to store a credential-owner authentication information associated with an identity of an individual, the memory being configured to store a issuer validation information associated with an issuer of a credential; and
a module configured to transmit to a first terminal device the credential-owner authentication information and the issuer validation information such that a first set of privileges associated with a first domain can be determined based on the credential-owner authentication information and based on the issuer validation information,the module configured to transmit to a second terminal device the credential-owner authentication information and the issuer validation information such that a second set of privileges different than the first set of privileges can be determined based on the credential-owner authentication information and based on the issuer validation information, the second set of privileges being associated with a second domain different than the first domain.
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes receiving from a credential a credential-owner authentication information associated with an identity of an individual. A issuer validation information associated with an issuer of the credential is also received. The method also includes providing a plurality of options, including a first option associated with a first domain and a second option associated with a second domain mutually exclusive from the first domain. The method also includes sending to a portion of the first domain the credential-owner authentication information and the issuer validation information in response to the first option being selected.
-
Citations
20 Claims
-
1. An apparatus, comprising:
-
a memory configured to store a credential-owner authentication information associated with an identity of an individual, the memory being configured to store a issuer validation information associated with an issuer of a credential; and a module configured to transmit to a first terminal device the credential-owner authentication information and the issuer validation information such that a first set of privileges associated with a first domain can be determined based on the credential-owner authentication information and based on the issuer validation information, the module configured to transmit to a second terminal device the credential-owner authentication information and the issuer validation information such that a second set of privileges different than the first set of privileges can be determined based on the credential-owner authentication information and based on the issuer validation information, the second set of privileges being associated with a second domain different than the first domain. - View Dependent Claims (2, 3)
-
-
4. A method, comprising:
-
receiving from a credential a credential-owner authentication information associated with an identity of an individual; receiving a issuer validation information associated with an issuer of the credential; and providing a plurality of options including a first option associated with a first domain and a second option associated with a second domain mutually exclusive from the first domain; and sending to a portion of the first domain the credential-owner authentication information and the issuer validation information in response to the first option being selected. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
authenticating an identity of an individual based on a credential-owner authentication information included in a credential and associated with the identity; determining an authenticity of the credential based on a credential-issuer validation information associated with the credential; retrieving from a privilege database disposed outside of the credential a first privilege value associated with a first domain based on the authenticating and the determining; and retrieving a second privilege value associated with a second domain different than the first domain based on the authenticating and the determining, the second privilege value being different that first privilege value. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method, comprising:
-
authenticating an identity of an individual based on a credential-owner authentication information included in a credential and associated with the identity; determining an authenticity of the credential based on a credential-issuer validation information associated with the credential; defining a request for confidential information associated with the individual in response to the authenticating and the determining; and receiving an indicator that sending of the confidential information to a relying entity has been approved, the indicator being triggered by the individual. - View Dependent Claims (19, 20)
-
Specification