System and method for identity confirmation of a contact published on a network
First Claim
Patent Images
1. A computer-implemented method for identity confirmation of a user on a network, comprising:
- receiving a presence notification of a user that indicates that the user is nearby on the network and is available;
wherein the presence notification includes data that comprises a display name for the user;
a sharing address for the user that resolves to a local machine address for the user;
a timestamp; and
a hash of a public key that is used to verify the identify of the user;
wherein the data is signed with a private key;
accessing a disseminated public key associated with the user;
generating an equivalent hash by hashing the disseminated public key; and
confirming the identity of the user when the hash of the public key contained within the data matches the equivalent hash.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method is provided for confirmation of the identity of a contact on the network. A notification that a nearby user is present on a network is signed with a private key associated with the nearby user. The private key is also associated with a public key. A local user that has the nearby user'"'"'s public key can verify the signature on the notification and confirm that the nearby user is the source of the notification. The verification of identity of the nearby user allows rich content previously stored for the nearby user to be displayed along with the nearby user'"'"'s presence information.
-
Citations
24 Claims
-
1. A computer-implemented method for identity confirmation of a user on a network, comprising:
-
receiving a presence notification of a user that indicates that the user is nearby on the network and is available;
wherein the presence notification includes data that comprises a display name for the user;
a sharing address for the user that resolves to a local machine address for the user;
a timestamp; and
a hash of a public key that is used to verify the identify of the user;
wherein the data is signed with a private key;accessing a disseminated public key associated with the user; generating an equivalent hash by hashing the disseminated public key; and confirming the identity of the user when the hash of the public key contained within the data matches the equivalent hash. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable storage medium that includes computer-executable instructions for identity confirmation of a user on a network, comprising:
-
receiving a presence notification of a user that indicates that the user is nearby on the network and is available;
wherein the presence notification includes data that comprises a display name for the user;
a sharing address for the user that resolves to a local machine address for the user; and
a public key that is used to verify the identify of the user;
wherein the data is signed with a private key;accessing a first copy of the public key that is associated with the user; determining whether the data published on the network that is signed with a private key associated with the public key includes a second copy of the public key; and confirming that the first copy of the public key and the second copy of the public key match so that the identity of the user is confirmed as the nearby contact. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for identity confirmation of a user on a network, comprising:
a computing device that includes an application that is configured to; receive a presence notification of a user that indicates that the user is nearby on the network and is available;
wherein the presence notification includes data that comprises a display name for the user; and
a public key that is used to verify the identify of the user;access a copy of the public key associated with the user; and confirm that the copy of the public key is the key associated with the data in the presence notification to confirm the identify of the user. - View Dependent Claims (19, 20, 21, 22, 23, 24)
Specification