Performing a business transaction without disclosing sensitive identity information to a relying party
First Claim
1. An apparatus, comprising:
- a machine;
a card selector on the machine to receive from a user a selection of an information card from a plurality of information cards stored on the machine;
a receiver to receive a security policy used in identifying said information card, said security policy including elements of a transaction, from a relying party, and a security token responsive to said security policy from an identity provider; and
a transmitter to transmit said security policy to said identity provider and said security token to said relying party, said security token responsive to said security policy,wherein said identity provider completes said transaction using said elements of said transaction, said security policy includes elements of a transaction, and said security token includes information about said identity provider completing said transaction and is at least partially responsive to said elements of a transaction.
7 Assignments
0 Petitions
Accused Products
Abstract
A user engages in a transaction with a relying party. The relying party requests identity information from the user in a security policy and identifies transaction elements for an on-line business transaction. Typically, the security policy and transaction elements are transmitted together; the security policy can be as little as a request to conduct the on-line business transaction. The user identifies an information card that satisfies the security policy. The computer system requests a security token from the identity provider managing the information card, which can include requesting a transaction receipt for the transaction elements. The computer system then returns the security token (and the transaction receipt) to the relying party, to complete the transaction.
194 Citations
37 Claims
-
1. An apparatus, comprising:
-
a machine; a card selector on the machine to receive from a user a selection of an information card from a plurality of information cards stored on the machine; a receiver to receive a security policy used in identifying said information card, said security policy including elements of a transaction, from a relying party, and a security token responsive to said security policy from an identity provider; and a transmitter to transmit said security policy to said identity provider and said security token to said relying party, said security token responsive to said security policy, wherein said identity provider completes said transaction using said elements of said transaction, said security policy includes elements of a transaction, and said security token includes information about said identity provider completing said transaction and is at least partially responsive to said elements of a transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for conducting a transaction with a relying party, comprising:
-
identifying elements of the transaction; receiving at a first computer a security policy from a second computer of the relying party, the security policy including the elements of the transaction; receiving at the first computer an identifier of a selected information card to conduct the transaction from a plurality of information cards stored on the machine, the information card satisfying the security policy; requesting at the first computer a security token from a third computer of an identity provider, providing the elements of the transaction to the identity provider; completing the transaction by the third computer of the identity provider; receiving at the first computer the security token from the third computer of the identity provider, the security token including information about the identity provider completing the transaction; and transmitting the security token from the first computer to the second computer of the relying party. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. An article, comprising a non-transitory storage medium, said storage medium having stored thereon instructions that, when executed by a machine, result in:
-
identifying elements of the transaction; receiving a security policy from the relying party, the security policy including the elements of the transaction; receiving an identifier of a selected information card to conduct the transaction from a plurality of information cards stored on the machine, the information card satisfying the security policy; requesting a security token from an identity provider, providing the elements of the transaction to the identity provider; completing the transaction by the third computer of the identity provider; receiving the security token from the identity provider, the security token including information about the identity provider completing the transaction; and transmitting the security token to the relying party. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification