Identity authentication using credentials
First Claim
Patent Images
1. A method comprising:
- receiving, from a computing device, an authentication request comprising a user name and a corresponding password, wherein;
the user name is in a first format, and comprises;
a value that is based on a time at which the user name was generated; and
a public key for the computing device; and
the password is encrypted, and is generated based on the user name;
extracting the public key from the user name;
decrypting the password, based on the public key, to create a decrypted password;
converting the user name from the first format to a second format;
comparing the decrypted password to the second format user name;
verifying, based on the value, the authentication request; and
in response to determining that the decrypted password corresponds to the second format user name, and in response to the verifying the authentication request, granting the authentication request from the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system may allow for authenticating a computing device. A computing device may send an authentication request over a network to an authentication computing device. The authentication request may include a user name and a password. The user name may include a credential and the password may be a digitally signed version of the user name. The authentication computing device may authenticate the requesting computing device by decrypting the password and comparing the received user name to the decrypted password.
35 Citations
16 Claims
-
1. A method comprising:
-
receiving, from a computing device, an authentication request comprising a user name and a corresponding password, wherein; the user name is in a first format, and comprises; a value that is based on a time at which the user name was generated; and a public key for the computing device; and the password is encrypted, and is generated based on the user name; extracting the public key from the user name; decrypting the password, based on the public key, to create a decrypted password; converting the user name from the first format to a second format; comparing the decrypted password to the second format user name; verifying, based on the value, the authentication request; and in response to determining that the decrypted password corresponds to the second format user name, and in response to the verifying the authentication request, granting the authentication request from the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a computing device comprising; a first processor; and a memory storing instructions that, when executed by the first processor, cause the computing device to; generate an authentication request comprising a user name and a corresponding password, wherein; the user name is in a first format, and comprises;
a value that is based on a time at which the user name was generated; and
a public key for the computing device; andthe password is encrypted, and is generated based on the user name; send the authentication request; and an authentication device comprising; a second processor; and a memory storing instructions that, when executed by the second processor, cause the authentication device to; receive, from the computing device, the authentication request; extract the public key from the user name; decrypt the password, based on the public key, to create a decrypted password; convert the user name from the first format to a second format; compare the decrypted password to the second format user name; verifying, based on the value, the authentication request; and in response to determining that the decrypted password corresponds to the second format user name, and in response to the verifying the authentication request, grant the authentication request from the computing device. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
receiving, from a computing device, an authentication request comprising a user name and a corresponding password, wherein; the user name is in a first format, and comprises; a random number that is based on a time at which the user name was generated; and a public key for the computing device; and the password is encrypted, and is generated based on the user name; extracting the public key from the user name; decrypting the password, based on the public key, to create a decrypted password; converting the user name from the first format to a second format; comparing the decrypted password to the second format user name; verifying, based on the random number, the authentication request; and in response to determining that the decrypted password corresponds to the second format user name, and in response to the verifying the authentication request, granting the authentication request from the computing device. - View Dependent Claims (15, 16)
-
Specification