PERFORMING A BUSINESS TRANSACTION WITHOUT DISCLOSING SENSITIVE IDENTITY INFORMATION TO A RELYING PARTY
First Claim
1. An apparatus, comprising:
- a machine;
a card selector on the machine to receive from a user a selection of an information card from a plurality of information cards stored on the machine;
a receiver to receive a security policy used in identifying said information card, said security policy including elements of a transaction, from a relying party, and a security token responsive to said security policy from an identity provider; and
a transmitter to transmit said security policy to said identity provider and said security token to said relying party, said security token responsive to said security policy,wherein said security policy identifies information requested by said relying party, said security policy includes elements of a transaction, said security token includes said information requested by said relying party, and said security token is at least partially responsive to said elements of a transaction.
7 Assignments
0 Petitions
Accused Products
Abstract
A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
102 Citations
37 Claims
-
1. An apparatus, comprising:
-
a machine; a card selector on the machine to receive from a user a selection of an information card from a plurality of information cards stored on the machine; a receiver to receive a security policy used in identifying said information card, said security policy including elements of a transaction, from a relying party, and a security token responsive to said security policy from an identity provider; and a transmitter to transmit said security policy to said identity provider and said security token to said relying party, said security token responsive to said security policy, wherein said security policy identifies information requested by said relying party, said security policy includes elements of a transaction, said security token includes said information requested by said relying party, and said security token is at least partially responsive to said elements of a transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for conducting a transaction with a relying party, comprising:
-
identifying elements of the transaction; receiving at a first computer a security policy from a second computer of the relying party, the security policy identifying information requested by the relying party and including the elements of the transaction; receiving at the first computer an identifier of a selected information card to conduct the transaction from a plurality of information cards stored on the machine, the information card satisfying the security policy; requesting at the first computer a security token from a third computer of an identity provider, including the information requested by the relying party and providing the elements of the transaction to the identity provider; receiving at the first computer the security token from the third computer of the identity provider; and transmitting the security token from the first computer to the second computer of the relying party. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. An article, comprising a storage medium, said storage medium having stored thereon instructions that, when executed by a machine, result in:
-
identifying elements of the transaction; receiving a security policy from the relying party, the security policy identifying information requested by the relying party and including the elements of the transaction; receiving an identifier of a selected information card to conduct the transaction from a plurality of information cards stored on the machine, the information card satisfying the security policy; requesting a security token from an identity provider, including the information requested by the relying party and providing the elements of the transaction to the identity provider; receiving the security token from the identity provider; and transmitting the security token to the relying party. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification