PUBLIC KEY CERTIFICATE BASED SOCIAL WEBSITE ACCOUNT AUTHENTICATION
First Claim
1. A method, comprising the steps of:
- A) receiving, by at least one server computer communicatively coupled to a network, a request to verify the authenticity of a social website account, said request comprising a business name and a business email address comprising a domain name;
B) determining, by said at least one server computer, whether a public key certificate has been issued for said domain name;
C) responsive to a determination that said public key certificate has been issued for said domain name, determining, by said at least one server computer, whether said public key certificate comprises said business name and said domain name;
D) responsive to a determination that said public key certificate comprises said business name and said domain name, determining, by said at least one server computer, whether said business email address is under the control of said business name; and
E) responsive to a determination that said business email address is under the control of said business name, certifying, by said at least one server computer, the authenticity of said social website account.
4 Assignments
0 Petitions
Accused Products
Abstract
Methods of the present inventions allow for verifying the authenticity of social website accounts. An example embodiment of a public key certificate based social website account authentication method may comprise the steps of receiving a request (that may include a business name and a business email address) to verify the authenticity of a social website account and determining whether a public key certificate has been issued for the domain name used by the business email address. If a public key certificate has been issued, the method may further comprise determining whether the public key certificate identifies the business name and/or domain name provided in the original request. If so, the method may further comprise determining whether the business email address is under the control of the business and, if so, certifying the authenticity of the social website account.
94 Citations
16 Claims
-
1. A method, comprising the steps of:
-
A) receiving, by at least one server computer communicatively coupled to a network, a request to verify the authenticity of a social website account, said request comprising a business name and a business email address comprising a domain name; B) determining, by said at least one server computer, whether a public key certificate has been issued for said domain name; C) responsive to a determination that said public key certificate has been issued for said domain name, determining, by said at least one server computer, whether said public key certificate comprises said business name and said domain name; D) responsive to a determination that said public key certificate comprises said business name and said domain name, determining, by said at least one server computer, whether said business email address is under the control of said business name; and E) responsive to a determination that said business email address is under the control of said business name, certifying, by said at least one server computer, the authenticity of said social website account. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising the steps of:
-
A) sending, by at least one server computer communicatively coupled to a network, a request to verify the authenticity of a social website account, said request comprising a business name and a business email address comprising a domain name; B) receiving, by said at least one server computer, confirmation that; i) said domain name and said business name are listed in a public key certificate issued for said domain name; and ii) said email address is under the control of said business name; and C) certifying, by said at least one server computer, the authenticity of said social website account. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
Specification