Steganographic authentication
First Claim
Patent Images
1. A computer-implemented authentication method comprising:
- defining an authentication network having a plurality of authentication paths;
receiving steganographic communication from an identity that is to be authenticated, the steganographic communication having a purpose that appears to be unrelated to authentication;
using the steganographic communication from the identity to follow an authentication path through the authentication network; and
authenticating the identity if the authentication path leads to a valid authentication state for the identity, wherein said acts of receiving, using and authenticating are performed independent of any encryption/decryption procedures.
1 Assignment
0 Petitions
Accused Products
Abstract
Various embodiments pertain to steganographically authenticating identities and authorizing transactions based on the authenticated identities.
7 Citations
20 Claims
-
1. A computer-implemented authentication method comprising:
-
defining an authentication network having a plurality of authentication paths; receiving steganographic communication from an identity that is to be authenticated, the steganographic communication having a purpose that appears to be unrelated to authentication; using the steganographic communication from the identity to follow an authentication path through the authentication network; and authenticating the identity if the authentication path leads to a valid authentication state for the identity, wherein said acts of receiving, using and authenticating are performed independent of any encryption/decryption procedures. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented authentication method comprising:
-
receiving steganographic communication from an identity that is to be authenticated, the steganographic communication comprising content which is in the clear and which appears unrelated to authentication, said steganographic communication also comprising content that is false cryptographic content; using the content of said steganographic communication to authenticate an identity. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. One or more computer-readable storage media having computer-readable instructions stored thereon which, when executed, perform a method comprising:
-
receiving steganographic communication from an identity that is to be authenticated, the steganographic communication comprising content which is in the clear and which appears unrelated to authentication, said steganographic communication also comprising content that is false cryptographic content; using the content of said steganographic communication to authenticate an identity. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification