User authentication using unique hidden identifiers
First Claim
Patent Images
1. A non-transitory computer readable medium including instructions that are configured to cause a computer system to allow a first user to authenticate a second user in the computer system without disclosing and storing valuable personal information in a personal information database by performing a method comprising:
- a first user device prompting the first user to create a first human readable identifier signifying a first network account on a network including at least one server;
the first user device creating the first network account, wherein account creation includes;
the first user device transmitting the first human readable identifier to the server;
the server receiving the first human readable identifier and assigning a first unique hidden identifier associated with the first human readable identifier to the first user device and storing the associated first human readable and first unique hidden identifiers in an account database; and
the server transmitting the first unique identifier to the first device;
the server assigning a first current session identifier to the first user device upon first network account creation or the first user logging into the system using a previously created first network account and storing the first current session identifier and the first human readable identifier in a current session database;
the server transmitting the first current session identifier to the first user device; and
the first user device adding contacts both directly and indirectly based on first user inputs,wherein adding contacts directly includes the first user device transmitting a first contact add request comprising the first human readable identifier and the first current session identifier to a second user device for an authentication by confirmation,wherein adding contacts indirectly includes;
the first user device, having already been authenticated by a third user device that has created a group comprising the first human readable identifier and a fourth human readable identifier associated with a fourth user device previously authenticated by the third user device, transmits a second contact add request to the fourth user,wherein human readable identifiers are used to identify added and potential contacts to user and wherein unique hidden identifiers of users are unknown to all users.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for user authentication using hidden unique identifiers in networks. In some example embodiments these systems and methods only require a single human readable identifier be provided and minimize personal information exposure in the event of a network breach.
-
Citations
6 Claims
-
1. A non-transitory computer readable medium including instructions that are configured to cause a computer system to allow a first user to authenticate a second user in the computer system without disclosing and storing valuable personal information in a personal information database by performing a method comprising:
-
a first user device prompting the first user to create a first human readable identifier signifying a first network account on a network including at least one server; the first user device creating the first network account, wherein account creation includes; the first user device transmitting the first human readable identifier to the server; the server receiving the first human readable identifier and assigning a first unique hidden identifier associated with the first human readable identifier to the first user device and storing the associated first human readable and first unique hidden identifiers in an account database; and the server transmitting the first unique identifier to the first device; the server assigning a first current session identifier to the first user device upon first network account creation or the first user logging into the system using a previously created first network account and storing the first current session identifier and the first human readable identifier in a current session database; the server transmitting the first current session identifier to the first user device; and the first user device adding contacts both directly and indirectly based on first user inputs, wherein adding contacts directly includes the first user device transmitting a first contact add request comprising the first human readable identifier and the first current session identifier to a second user device for an authentication by confirmation, wherein adding contacts indirectly includes;
the first user device, having already been authenticated by a third user device that has created a group comprising the first human readable identifier and a fourth human readable identifier associated with a fourth user device previously authenticated by the third user device, transmits a second contact add request to the fourth user,wherein human readable identifiers are used to identify added and potential contacts to user and wherein unique hidden identifiers of users are unknown to all users. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification