CENTRALIZED IDENTITY AUTHENTICATION FOR ELECTRONIC COMMUNICATION NETWORKS
First Claim
1. A method of centralized identity authentication over a communications network, comprising:
- authenticating with a configured server identities of a registered user and a registered vendor over the communications network prior to completion of a transaction between the registered user and the registered vendor.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of centralized identity authentication for use in connection with a communications network includes registering users of the communications network such that each registered user'"'"'s identity is uniquely defined and determinable, and registering a plurality of vendors having a presence on the communications network. The registered vendors selectively transact with registered users, wherein the transactions include: (i) the registered vendor selling goods and/or services to the registered user; (ii) the registered vendor granting the registered user access to personal records maintained by the registered vendor; and/or (iii) the registered vendor communicating to the registered user personal information maintained by the registered vendor. The method also includes each user'"'"'s identity being authenticated over the communications network prior to completion of transactions between registered vendors and registered users.
-
Citations
20 Claims
-
1. A method of centralized identity authentication over a communications network, comprising:
authenticating with a configured server identities of a registered user and a registered vendor over the communications network prior to completion of a transaction between the registered user and the registered vendor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A system of centralized identity authentication over a communications network, comprising:
a server configured to; authenticate identities of a registered user and a registered vendor over the communications network prior to completion of a transaction between the registered user and the registered vendor. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
Specification