Identity-independent authentication tokens
First Claim
1. A computer-implemented method comprising:
- generating, via a processor, multiple authentication tokens, each authentication token comprising a unique identifier used to access one or more online accounts;
responsive to receiving a request from an individual for an authentication token without an identification of the individual, issuing, via the processor, a selected one of the multiple authentication tokens to the individual after receiving one or more answers to one or more questions and without requiring the individual to provide a legal name of the individual;
receiving a validation request, including the unique identifier for the selected authentication token, from a service provider of a specific online account after the individual has mapped the authentication token to the specific online account; and
sending a validation of the selected authentication token to the service provider.
0 Assignments
0 Petitions
Accused Products
Abstract
Identity-independent authentication tokens enable issuance of a single strong credential that can be mapped to an individual at each of multiple accounts within the online world. An issuer generates one or more authentication tokens for issuance to individuals or other entities. In some instances, each of these authentication tokens comprises a unique serial number. The individual or other entity may then request an authentication token from the issuer. The issuer may then issue the token to the individual without the need to ask or require the individual to identify his or herself. The individual may then map this issued authentication token to the individual'"'"'s password at each of the individual'"'"'s online accounts.
93 Citations
25 Claims
-
1. A computer-implemented method comprising:
-
generating, via a processor, multiple authentication tokens, each authentication token comprising a unique identifier used to access one or more online accounts; responsive to receiving a request from an individual for an authentication token without an identification of the individual, issuing, via the processor, a selected one of the multiple authentication tokens to the individual after receiving one or more answers to one or more questions and without requiring the individual to provide a legal name of the individual; receiving a validation request, including the unique identifier for the selected authentication token, from a service provider of a specific online account after the individual has mapped the authentication token to the specific online account; and sending a validation of the selected authentication token to the service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. One or more non-transitory computer-readable media storing computer-executable instructions that, when executed by one or more processors, cause a machine to:
-
receive, from a requestor, a request for an authentication token comprising a unique identifier used to access an online account; issue the authentication token to the requestor after receiving one or more answers to one or more questions and without requiring the requestor to provide a legal name of the requestor in the request; receive a validation request, including the unique identifier for the authentication token, from a service provider of the online account after the requestor has mapped the authentication token to the online account; and send a validation of the authentication token to the service provider. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A computer-implemented method comprising:
-
requesting an authentication token from an issuer without providing an identification of an individual, the authentication token comprising a unique identifier for use in accessing multiple online accounts accessible by the individual; receiving the authentication token responsive to the requesting after submitting one or more answers to one or more questions and without providing a legal name of the individual;
,creating a new online account with a service provider; mapping the new online account to the authentication token such that the individual is allowed to access the new online account with use of the authentication token, wherein the authentication token is validated by the issuer. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification