×

Trust inheritance in network authentication

  • US 7,565,547 B2
  • Filed: 02/25/2005
  • Issued: 07/21/2009
  • Est. Priority Date: 02/27/2004
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer implemented method for preventing phishing scams so that a user is able to authenticate electronic services through an untrusted electronic terminal, said user being associated with a username and a trusted personal entity, said method comprising the steps of:

  • (a) said user providing said username to an authentication interface;

    (b) sending said username to at least one validation entity;

    (c) identifying said username as an authentication request at said validation entity by an authentication application;

    (d) looking up with said username in said validation entity whether said username is already registered in said validation entity;

    i. if said username is registered with said validation entity, retrieving a unique identifier of said trusted personal entity associated with said user and generating a one time password, and sending said password to said trusted personal entity using said unique identifier;

    ii. if said username is not registered with said validation entity, said authentication application rejecting the authentication attempt;

    (e) said user, after retrieving said password from said trusted personal entity, providing said unique identifier and said password to said authentication interface, whereby an application permits access to electronic services through said untrusted electronic terminal and said application recording said electronic services to an account associated with said unique identifier,wherein identifying said username is performed by a processor functionally associated with the computer, and wherein the processor identifies by executing computer-readable instructions embedded on a computer readable storage medium.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×