System and method for user authentication using crypto-currency transactions as access tokens
First Claim
Patent Images
1. A method for crypto-currency transaction authentication, the method comprising:
- receiving, by a computing device, from a data storage device associated with a first entity, authentication information demonstrating possession of a private key;
retrieving, by the computing device, from an audit chain, at least one crypto-currency transaction to an address associated with a public key corresponding to the private key;
authenticating, by the computing device, based on the retrieved crypto-currency transaction, the first entity.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for crypto-currency transaction authentication includes receiving, by a computing device, from a data storage device associated with a first entity, an authentication information demonstrating possession of a private key, retrieving, by the computing device, from an audit chain, at least one crypto-currency transaction to an address associated with a public key corresponding to the private key, and authenticating, by the computing device, based on the retrieved crypto-currency transaction, the first entity.
-
Citations
20 Claims
-
1. A method for crypto-currency transaction authentication, the method comprising:
-
receiving, by a computing device, from a data storage device associated with a first entity, authentication information demonstrating possession of a private key; retrieving, by the computing device, from an audit chain, at least one crypto-currency transaction to an address associated with a public key corresponding to the private key; authenticating, by the computing device, based on the retrieved crypto-currency transaction, the first entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for crypto-currency transaction authentication, the system comprising:
-
a data storage device associated with a first entity; a computing device configured to receive, from the data storage device, authentication information demonstrating possession of a private key, to retrieve, from an audit chain, at least one crypto-currency transaction to an address associated with a public key corresponding to the private key, and to authenticate, based on the retrieved crypto-currency transaction, the first entity.
-
Specification