Digital credential usage reporting
First Claim
1. A method comprising:
- receiving, over a data transmission network, use information describing a first use of a digital credential by an owner of a digital credential, at any of a plurality of different services where the digital credential can be used, the digital credential being a digital security mechanism associated with a the owner'"'"'s identity;
receiving use information describing a second use of the digital credential by a delegate of the owner of the digital credential, at any of the plurality of different services where the digital credential can be used;
storing the use information in an activity log;
generating an activity report for the delegate based on the activity log;
generating an activity report for the owner based on the activity log;
allowing said owner to view all reports; and
allowing said delegate to view only the activity report for the delegate and not the activity report for the owner or activity reports for other delegates.
1 Assignment
0 Petitions
Accused Products
Abstract
An credential verification service (CVS) authenticates digital credentials, such as, digital certificates, at the request of online service providers. The CVS stores the authentication results and transaction information in a central activity log. The transaction information can include a size of the transaction, the online service requesting the authentication, an internet protocol (IP) address of a computing device originating the transaction and the goods or services involved in the transaction. The CVS generates an activity report from the activity log that lists the authentication results and the transaction information. A fraud detection module within the CVS analyzes the activity log to identify any unusual patterns in order to identify fraudulent activities or general misuse of the digital credential.
-
Citations
34 Claims
-
1. A method comprising:
-
receiving, over a data transmission network, use information describing a first use of a digital credential by an owner of a digital credential, at any of a plurality of different services where the digital credential can be used, the digital credential being a digital security mechanism associated with a the owner'"'"'s identity; receiving use information describing a second use of the digital credential by a delegate of the owner of the digital credential, at any of the plurality of different services where the digital credential can be used; storing the use information in an activity log; generating an activity report for the delegate based on the activity log; generating an activity report for the owner based on the activity log; allowing said owner to view all reports; and allowing said delegate to view only the activity report for the delegate and not the activity report for the owner or activity reports for other delegates. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
receiving, over a data transmission network, transaction requests from a plurality of delegate users who are delegated from an owner, wherein the transaction requests include digital credentials for the delegate users, the digital credentials being digital security mechanisms associated with users'"'"' identities; processing the transaction requests; and communicating transaction information to a central service, wherein the transaction information includes the digital credentials of the delegates, the transaction information communicated to create, for the plurality of delegate users, activity reports regarding the usage of the digital credentials, the activity reports created at the central service that said owner is allowed to view while each delegate is allowed to view only their own activity report and not allowed to view reports for other delegates. - View Dependent Claims (14, 15, 16, 17)
-
-
18. An article comprising a machine-readable medium storing instructions operable to cause one or more machines to perform operations comprising:
-
receiving, over a data transmission network, use information describing a first use of a digital credential by an owner of a digital credential, at any of a plurality of different services where the digital credential can be used, the digital credential being a digital security mechanism associated with the owner'"'"'s identity; receiving use information describing a second use of the digital credential by a delegate of the owner of the digital credential, at any of the plurality of different services where the digital credential can be used; storing the use information in an activity log; generating an activity report for the delegate based on the activity log; generating an activity report for the owner based on the activity log; allowing said owner to view all reports; and allowing said delegate to view only the activity report for the delegate and not the activity report for the owner or activity reports for other delegates. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. An article comprising a machine-readable medium storing instructions operable to cause one or more machines to perform operations comprising:
-
receiving, over a data transmission network, transaction requests from a plurality of delegate users who are delegated from an owner, wherein the transaction requests include digital credentials for the delegate users, the digital credentials being digital security mechanisms associated with users'"'"' identities; processing the transaction requests; and communicating transaction information to a central service, wherein the transaction information includes the digital credentials of the delegates, the transaction information communicated to create, for the plurality of delegate users, activity reports regarding the usage of the digital credentials, the activity reports created at the central service that said owner is allowed to view while each delegate is allowed to view only their own activity report and not allowed to view reports for other delegates. - View Dependent Claims (31, 32, 33, 34)
-
Specification