Verification of user communication addresses
First Claim
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, the program configured to perform a stateless verification by the at least one computing device that a user of a client has access to a communication address, wherein when executed the program causes the at least one computing device to at least:
- generate encrypted verification data for a user account, the encrypted verification data including a first verification code and the communication address associated with the user of the client;
send the encrypted verification data to the client using a first network and a first communication protocol;
transmit a second verification code to the communication address using a second network and a second communication protocol; and
in response to receiving from the client via the first communication protocol the encrypted verification data and the transmitted second verification code received by the communication address, verify that the second verification code was received by the communication address by decrypting the received verification data, retrieving the sent first verification code from the decrypted verification data, and observing that the retrieved first verification code matches the second verification code received by the at least one computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for performing stateless verification of communication addresses. Encrypted verification data is generated for a user account, including a communication address and a first verification code, and a timestamp. The encrypted verification data is sent to a client, and the verification code is transmitted to the communication address. The encrypted verification data and a second verification code are received from the client. The communication address is verified in response to observing that the first verification code from the encrypted verification data matches the second verification code.
-
Citations
20 Claims
-
1. A non-transitory computer-readable medium embodying a program executable in at least one computing device, the program configured to perform a stateless verification by the at least one computing device that a user of a client has access to a communication address, wherein when executed the program causes the at least one computing device to at least:
-
generate encrypted verification data for a user account, the encrypted verification data including a first verification code and the communication address associated with the user of the client; send the encrypted verification data to the client using a first network and a first communication protocol; transmit a second verification code to the communication address using a second network and a second communication protocol; and in response to receiving from the client via the first communication protocol the encrypted verification data and the transmitted second verification code received by the communication address, verify that the second verification code was received by the communication address by decrypting the received verification data, retrieving the sent first verification code from the decrypted verification data, and observing that the retrieved first verification code matches the second verification code received by the at least one computing device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for performing a stateless verification that a user of a client has access to a communication address, the system comprising:
-
at least one computing device; and at least one application executed in the at least one computing device, wherein when executed the at least one application causes the at least one computing device to at least; generate encrypted verification data for a user account, the encrypted verification data including a first verification code and the communication address associated with the user of the client; send the encrypted verification data to the client via a network page using a first network and a first communication protocol; transmit a second verification code to the communication address using a second network and a second communication protocol; and in response to receiving from the client via the first communication protocol the encrypted verification data and the transmitted second verification code received by the communication address, verify that the transmitted second verification code was received by the communication address by decrypting the received verification data, retrieving the sent first verification code from the decrypted verification data, and observing that the retrieved first verification code matches the second verification code received by the at least one computing device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for performing a stateless verification that a user of a client has access to a communication address, the method comprising:
-
generating, via at least one of one or more computing devices, encrypted verification data for a user account, the encrypted verification data including a first verification code and the communication address associated with the user of the client; sending, using a first network and via at least one of the one or more computing devices, the encrypted verification data to the client via a first communication protocol; transmitting, using a second network and via the at least one of the one or more computing devices, a second verification code to the communication address via a second communication protocol; receiving from the client via the first communication protocol, by the one or more computing devices, the encrypted verification data and the transmitted second verification code received by the communication address; and verifying, by the one or more computing devices, that the transmitted second verification code was received by the communication address by decrypting the received verification data, retrieving the sent first verification code from the decrypted verification data, and observing that the retrieved first verification code matches the second verification code received by the one or more computing devices. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification