Methods, apparatus and systems for securing user-associated passwords used for identity authentication
First Claim
1. A method of encrypting authentication information, comprising:
- receiving a request for a user-associated password at a user computing device from a requesting device;
receiving the user-associated password at the user computing device from a user, the user-associated password having a format that comprises a number of characters, wherein the user-associated password is a password that authenticates an identity of the user, thereby being authentication information;
generating a temporary password, by the user computing device;
generating, by the user computing device, a key from the temporary password;
encrypting, by the user computing device, the received user-associated password using at least the key resulting in an encrypted user-associated password having the same format and the same number of characters as the received user-associated password; and
communicating the encrypted user-associated password from the user computing device to the requesting device in place of the received user-associated password in response to the request for the user-associated password.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatus and systems for securing user-associated passwords used in transactions are disclosed. The methods include a user computing device receiving a user-associated password such as a PIN from a user, where the user-associated password is operable to authenticate an identity of a user. The user-associated password may be received in response to the user receiving a request for the user-associated password from a third party such as a merchant. The user computing device may generate a temporary password such as a one-time password, dynamic password, or the like, and encrypt the user-associated password using the temporary password. The encrypted user-associated password may then be communicated to the third party in lieu of the user-associated password received by the user.
35 Citations
19 Claims
-
1. A method of encrypting authentication information, comprising:
-
receiving a request for a user-associated password at a user computing device from a requesting device; receiving the user-associated password at the user computing device from a user, the user-associated password having a format that comprises a number of characters, wherein the user-associated password is a password that authenticates an identity of the user, thereby being authentication information; generating a temporary password, by the user computing device; generating, by the user computing device, a key from the temporary password; encrypting, by the user computing device, the received user-associated password using at least the key resulting in an encrypted user-associated password having the same format and the same number of characters as the received user-associated password; and communicating the encrypted user-associated password from the user computing device to the requesting device in place of the received user-associated password in response to the request for the user-associated password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of decrypting authentication information, comprising:
-
receiving a user-associated password from a user, the user-associated password having a format that comprises a number of characters; storing the user-associated password in association with the user; sending a request to a user computing device for the user-associated password; receiving an encrypted user-associated password having the same format and the same number of characters from the user computing device in place of the requested user-associated password, wherein the encrypted user-associated password, when decrypted, authenticates an identity of the user by matching the stored user-associated password; generating a temporary password, at a decryption server as would have been done using the user computing device; decrypting the encrypted user-associated password using at least the temporary password, resulting in a user-associated password, the user-associated password being authentication information; and comparing the decrypted user-associated password to the stored user associated password. - View Dependent Claims (10, 11, 12)
-
-
13. A method of encrypting authentication information, comprising:
-
receiving a request for a user-associated password at a user computing device from a requesting device; receiving the user-associated password at the user computing device from a user, the user-associated password having a decimal form, wherein the user-associated password is a password that authenticates an identity of the user, thereby being authentication information; generating a temporary password, by the user computing device; converting, by the user computing device, the user-associated password into a binary form; performing, by the user computing device, a bitwise XOR of the binary form of the user-associated password with at least a portion of the temporary password as represented in a binary form resulting in a binary and encrypted form of the user-associated password; converting, by the user computing device, the binary form of the encrypted user-associated password into decimal form; and communicating the decimal form of the encrypted user-associated password from the user computing device to the requesting device in place of the received user-associated password in response to the request for the user-associated password. - View Dependent Claims (14, 15)
-
-
16. A device for encrypting authentication information, comprising:
-
a communication interface operable to receive a request from a requesting device for a user-associated password and to receive the user-associated password having a format that comprises a number of characters from a user, the user-associated password authenticates an identity of the user, thereby being authentication information; and a processor operable to generate a temporary password, generate a key from the temporary password, and encrypt the received user-associated password using at least the key resulting in an encrypted user-associated password having the same format and the same number of characters as the received user-associated password, the processor operable to transmit the encrypted user-associated password via the communication interface to the requesting device in place of the received user-associated password in response to the request for the user-associated password. - View Dependent Claims (17, 18, 19)
-
Specification