Accessing data based on authenticated user, provider and system
First Claim
Patent Images
1. A computer-implemented method comprising:
- authenticating an authentication system, a user, and a service provider;
generating, by a computer system, an access code based on a one way permutation of data related to the authenticated user and data related to the authenticated service provider, where the one way permutation is a function in which the data related to the authenticated user and the data related to the authenticated service provider cannot be determined by knowing the access code;
determining one or more data storage locations based on the access code;
using the access code to access at least some of the data storage locations; and
retrieving the data from the accessed data storage locations.
2 Assignments
0 Petitions
Accused Products
Abstract
A method that includes authenticating an authentication system, a user, and a service provider, generating an access code based on a combination of data related to the authenticated user and data related to the authenticated service provider, and using the access code to access at least some of data storage locations is described herein.
228 Citations
23 Claims
-
1. A computer-implemented method comprising:
-
authenticating an authentication system, a user, and a service provider; generating, by a computer system, an access code based on a one way permutation of data related to the authenticated user and data related to the authenticated service provider, where the one way permutation is a function in which the data related to the authenticated user and the data related to the authenticated service provider cannot be determined by knowing the access code; determining one or more data storage locations based on the access code; using the access code to access at least some of the data storage locations; and retrieving the data from the accessed data storage locations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer-implemented method for authenticating transactions with multiple, different service providers based on the presence of a single physical token associated with a user, the method comprising:
-
authenticating the user based on the presence of the physical token and authenticating a first service provider; generating, by a computer system, a first access code based on a one way permutation of data related to the authenticated user and data related to the authenticated first service provider, determining one or more data storage locations based on the first access code; using the first access code to access at least some of the data storage locations; authenticating the user based on the presence of the physical token and authenticating a second service provider, the second service provider being different than the first service provider; generating, by a computer system, a first access code based on a one way permutation of data related to the authenticated user and data related to the authenticated second service provider, determining one or more data storage locations based on the second access code; and using the second access code to access at least some of the data storage locations.
-
Specification