System and method for credential management and identity verification
First Claim
1. A system of credential management and identity verification for use with a computing device, comprising:
- a portable input computing device in data communication with the computing device, said portable input computing device being configured to store a plurality of credentials and to store a plurality of user-supplied mask data;
an application that, when executed on the portable input computing device;
detects a request for credentials being published on a display of the computing device, wherein said portable input computing device receives the request for credentials in response to the computing device accessing at least one of a locally accessible resource, a resource accessible via a network, and a resource accessible via the Internet;
provides at least one alert to a user of the computing device to confirm identity via submission of at least one of a biometric and a non-biometric input to the input device;
receives the at least one of the biometric and non-biometric input;
verifies identity of the user based on the received input;
transmits respective mask data associated with the verified user identity to the computing device that is configured to visually block said request for credentials;
transmits respective credentials to the computing device associated with the verified user identity;
wherein said application, when executed on said portable input computing device;
detects an identity of a source of said request for credentials;
determines respective mask data associated with the verified user identity and the identified source; and
transmits said determined mask data to the computing device that is associated with both the verified user identity and the identified source.
0 Assignments
0 Petitions
Accused Products
Abstract
A system of credential management and identity verification includes a portable input device and an application that, when executed on the input device, authenticates a user of the input device and provides associated credentials to a computing device. The application detects a request for credentials presented by a proximate computing device. Then, the application alerts a user of the computing device to confirm his identity by submitting one of a biometric or non-biometric authenticating input to the input device. The authenticating input is received by the input device and used to verify the identity of the user. If the identity is verified, the application transmits the associated encrypted credentials and mask data to the computing device. The input device may be a pointing device connected wirelessly or via wired connection to the computer. User authentication data is provided to the input device at an initial or predetermined time.
-
Citations
19 Claims
-
1. A system of credential management and identity verification for use with a computing device, comprising:
-
a portable input computing device in data communication with the computing device, said portable input computing device being configured to store a plurality of credentials and to store a plurality of user-supplied mask data; an application that, when executed on the portable input computing device; detects a request for credentials being published on a display of the computing device, wherein said portable input computing device receives the request for credentials in response to the computing device accessing at least one of a locally accessible resource, a resource accessible via a network, and a resource accessible via the Internet; provides at least one alert to a user of the computing device to confirm identity via submission of at least one of a biometric and a non-biometric input to the input device; receives the at least one of the biometric and non-biometric input; verifies identity of the user based on the received input; transmits respective mask data associated with the verified user identity to the computing device that is configured to visually block said request for credentials; transmits respective credentials to the computing device associated with the verified user identity; wherein said application, when executed on said portable input computing device; detects an identity of a source of said request for credentials; determines respective mask data associated with the verified user identity and the identified source; and transmits said determined mask data to the computing device that is associated with both the verified user identity and the identified source. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of credential management and identity verification for use with a computing device, comprising:
-
providing a portable input computing device in data communication with the computing device detecting a request for credentials that is being displayed upon a display of the computing device, said portable input computing device being configured to store a plurality of credentials and a plurality of mask data, receiving by an application the request for credentials in response to the computing device accessing at least one of a locally accessible resource, a resource accessible via a network, and a resource accessible via the internet; providing by said portable input computing device at least one alert to a user of the computing device to confirm identity via submission of at least one of a biometric input and a non-biometric input to the portable input computing device; receiving by said portable input computing device the at least one of the biometric and non-biometric input; verifying by said portable input computing device an identity of the user based on the received input; determining by said portable input computing device respective mask data associated with the verified user identity; transmitting by said portable input computing device said mask data associated with the verified user identity to the computing device that is configured to visually block said request for credentials; transmitting by said portable input computing device the credentials to the computing device based on the verified user identity; said application detecting an identity of a source of said request for credentials; said application determining respective mask data associated with the verified user identity and the identified source; and transmitting by said application said determined mask data to the computing device that is associated with both the verified user identity and the identified source. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification