Ubiquitous webtoken
First Claim
1. A method, comprisingreceiving, by at least one device and from a user device, a first request to set up an account;
- receiving, by the at least one device, a shared key, where the shared key is generated based on a private key, of a private key/public key pair corresponding to the user device, information associated with the at least one device, and information regarding an identity selection, from a plurality of user identity information, associated with a user of the user device;
storing, by the at least one device, the shared key in a memory;
receiving, by the at least one device and from the user device, a second request to log in to the account, where the second request includes a first webtoken generated based on the shared key and a first time interval at which the first webtoken is generated;
retrieving, by the at least one device and based on the second request, the shared key stored in the memory;
generating, by the at least one device, a second webtoken based on the shared key, retrieved from the memory, and a second time interval at which the second webtoken is generated;
comparing, by the at least one device, the second webtoken and the first webtoken;
authenticating, by the at least one device, the user device when the second webtoken matches the first webtoken; and
permitting, by the at least one device, the user device access to the account based on the authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
A first device receives, from a second device, a first request to set up an account, where the first request includes a shared key and information associated with the second device, where the shared key is calculated based on a private key, of a private key/public key pair, and information regarding an identity selection, from user identity information, associated with a user of the second device; and store the shared key in a memory. The first device receives, from the second device, a second request to log in to the account, where the second request includes a first webtoken and information associated with the second device, where the first webtoken is calculated based on the shared key and a first time interval; retrieves the shared key; generates a second webtoken based on the shared key and a second time interval; performs an authentication operation by comparing the first webtoken and the second webtoken; and permits the second device to access the account when the first webtoken matches the second webtoken.
11 Citations
20 Claims
-
1. A method, comprising
receiving, by at least one device and from a user device, a first request to set up an account; -
receiving, by the at least one device, a shared key, where the shared key is generated based on a private key, of a private key/public key pair corresponding to the user device, information associated with the at least one device, and information regarding an identity selection, from a plurality of user identity information, associated with a user of the user device; storing, by the at least one device, the shared key in a memory; receiving, by the at least one device and from the user device, a second request to log in to the account, where the second request includes a first webtoken generated based on the shared key and a first time interval at which the first webtoken is generated; retrieving, by the at least one device and based on the second request, the shared key stored in the memory; generating, by the at least one device, a second webtoken based on the shared key, retrieved from the memory, and a second time interval at which the second webtoken is generated; comparing, by the at least one device, the second webtoken and the first webtoken; authenticating, by the at least one device, the user device when the second webtoken matches the first webtoken; and permitting, by the at least one device, the user device access to the account based on the authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
one or more first devices, where at least one of the one or more first devices connects to a second device, the one or more first devices are to; receive, from the second device, a first request to set up an account, where the first request includes a shared key and information associated with the second device, where the shared key is calculated based on a private key, of a private key/public key pair, and information regarding an identity selection, from a plurality of user identity information, associated with a user of the second device, store the shared key in a memory, receive, from the second device, a second request to log in to the account, where the second request includes a first webtoken and information associated with the second device, where the first webtoken is calculated based on the shared key and a first time interval at which the first webtoken is calculated, retrieve the shared key, from the memory, based on the second request, generate a second webtoken based on the shared key, retrieved from the memory, and a second time interval at which the second webtoken is calculated, perform an authentication operation by comparing the first webtoken and the second webtoken, and permit the second device to access the account when the first webtoken matches the second webtoken. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a first device connected to a user device and a second device, the first device is to; receive, from the user device, a shared key, information associated with the user device, and permission indicators associated with user identity information, receive, from the second device, a request for an identity verification, where the request includes a first webtoken, information associated with the second device, and information associated with the user device, retrieve, based on the request, the shared key and the permission indicators, generate a second webtoken based on the shared key and a time interval at which the second webtoken is generated, perform an authentication operation by comparing the first webtoken and the second webtoken, retrieve identity information, associated with the user of the user device, based on the permission indicators when the first webtoken matches the second webtoken, and send, to the second device, an identity verification message that includes the retrieved identity information. - View Dependent Claims (18, 19, 20)
-
Specification