USER AUTHENTICATION USING UNIQUE HIDDEN IDENTIFIERS
First Claim
Patent Images
1. A non-transitory computer readable medium including instructions that are configured to cause a computer system to authenticate a user by performing a method comprising:
- a user device prompting a user to create a human readable identifier signifying a network account;
the user device creating the network account signified by the human readable identifier, wherein account creation includes a server assigning a unique identifier to the user device;
the user device prompting the user to add contacts directly or indirectly; and
the user device adding contacts directly or indirectly based on user input, where human readable identifiers are used to identify added contacts to the user.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for user authentication using hidden unique identifiers in networks. In some example embodiments these systems and methods only require a single human readable identifier be provided and minimize personal information exposure in the event of a network breach.
-
Citations
20 Claims
-
1. A non-transitory computer readable medium including instructions that are configured to cause a computer system to authenticate a user by performing a method comprising:
-
a user device prompting a user to create a human readable identifier signifying a network account; the user device creating the network account signified by the human readable identifier, wherein account creation includes a server assigning a unique identifier to the user device; the user device prompting the user to add contacts directly or indirectly; and the user device adding contacts directly or indirectly based on user input, where human readable identifiers are used to identify added contacts to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A process of user authentication comprising:
-
creating a computer network operable to allow users to create accounts; wherein the computer network is operable to allow users to become contacts directly or indirectly; and wherein information required for user authentication comprises a human readable identifier without requiring other personal information. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification