×

Systems and methods to secure user identification

  • US 8,838,982 B2
  • Filed: 09/20/2012
  • Issued: 09/16/2014
  • Est. Priority Date: 09/21/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving, in a computing apparatus, a request from a user device, the request including a user identifier and user information provided by the user device, the user identifier configured to representing a user of the user device;

    extracting, by the computing apparatus, a digital signature from the user identifier, the digital signature generated by a partner device separated from the user device and the computing apparatus;

    generating, by the computing apparatus, a dataset based at least on the user information received in the request; and

    verifying, by the computing apparatus, the dataset against the digital signature extracted from the user identifier, wherein the verifying of the dataset against the digital signature comprisescombining, by the computing apparatus, the dataset with a secret shared between the computing apparatus and the partner device to generate a combined dataset;

    applying, by the computing apparatus, a cryptographic one-way hash function on the combined dataset to generate a hash result; and

    comparing, by the computing apparatus, the hash result with the digital signature to determine whether the hash result matches with the digital signature; and

    rejecting, by the computing apparatus, the request if the dataset fails verification against the digital signature.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×