Device for creating reliable trusted signatures
First Claim
Patent Images
1. A computer-implemented method, comprising:
- under the control of one or more computer systems configured with executable instructions,obtaining, at an identity verification token of a signatory, a document identifier for identifying a document, wherein the identity verification token is a device registered with an identity registrar and authorized by the identity registrar to generate a signature, and wherein the document identifier was previously generated in response to a requesting party requesting the document identifier based at least in part on a transaction being performed between the requesting party and a user of the identity verification token;
receiving, at the identity verification token of the signatory, a password and biometric input of a signatory, wherein one or more of the password or the biometric input indicate that the signatory is signing under duress, wherein indications of duress include one or more of use of a duress password, use of a fingerprint predetermined to indicated duress, physiological biometric data indicating that the signatory is under duress, or behavioral biometric data indicating that the signatory is under duress;
obtaining, at the identity verification token of the signatory, an identity verification identifier for identifying the identity verification token;
obtaining, at the identity verification token of the signatory, a timestamp;
generating a signature based at least in part on the document identifier, the password and biometric input, and the identity verification identifier; and
providing at least the signature to one or more of an identity registrar, a merchant, or another identity verification token.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for generating a signature for a document using an identity verification token. The identity verification token receives a request that includes a set of credential data from a signatory, obtains a document identifier that identifies the document to a service provider, and obtains a token identifier that identifies the identity verification token to the service provider. The identity verification token generates the signature based at least in part on the obtained document identifier, the received set of credential data, and obtained the token identifier, and provides the signature.
55 Citations
21 Claims
-
1. A computer-implemented method, comprising:
-
under the control of one or more computer systems configured with executable instructions, obtaining, at an identity verification token of a signatory, a document identifier for identifying a document, wherein the identity verification token is a device registered with an identity registrar and authorized by the identity registrar to generate a signature, and wherein the document identifier was previously generated in response to a requesting party requesting the document identifier based at least in part on a transaction being performed between the requesting party and a user of the identity verification token; receiving, at the identity verification token of the signatory, a password and biometric input of a signatory, wherein one or more of the password or the biometric input indicate that the signatory is signing under duress, wherein indications of duress include one or more of use of a duress password, use of a fingerprint predetermined to indicated duress, physiological biometric data indicating that the signatory is under duress, or behavioral biometric data indicating that the signatory is under duress; obtaining, at the identity verification token of the signatory, an identity verification identifier for identifying the identity verification token; obtaining, at the identity verification token of the signatory, a timestamp; generating a signature based at least in part on the document identifier, the password and biometric input, and the identity verification identifier; and providing at least the signature to one or more of an identity registrar, a merchant, or another identity verification token. - View Dependent Claims (2, 3, 4)
-
-
5. A system, comprising:
-
at least one computing device having one or more processors that execute instructions to implement one or more services, wherein the one or more services are configured to; receive a request from a requestor to verify a signatory to a document; obtain; a document identifier for the document; a signatory identifier, wherein the signatory identifier identifies the signatory to an identity registrar; a set of credential data corresponding to the signatory identifier, wherein the set of credential data comprises a password and biometric input of a signatory, wherein one or more of the password or the biometric input indicate that the signatory is signing under duress, wherein indications of duress include one or more of use of a duress password, use of a fingerprint predetermined to indicated duress, physiological biometric data indicating that the signatory is under duress, or behavioral biometric data indicating that the signatory is under duress; a token identifier; and a first signature corresponding to the document identifier; generate a second signature based at least in part on the document identifier, a subset of the set of the credential data, and the token identifier; determine a result based at least in part on a match between the first signature and the second signature; and provide the result to the requestor. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage medium having stored thereon executable instructions that, when executed by one or more processors of a computer system, cause the computer system to at least:
-
receive a request to generate a signature for a document in response to a requestor requesting generation of the signature, wherein the request includes an indication of acceptable credentials for signing; obtain a document identifier, wherein the document identifier identifies the document to a service provider; obtain a token identifier, wherein the token identifier identifies a token to the service provider; generate the signature based at least in part on the document identifier, a set of credentials selected by a signatory, wherein the set of credentials comprises a password and biometric input of a signatory, wherein one or more of the password or the biometric input indicate that the signatory is signing under duress, wherein indications of duress include one or more of use of a duress password, use of a fingerprint predetermined to indicated duress, physiological biometric data indicating that the signatory is under duress, or behavioral biometric data indicating that the signatory is under duress, and the token identifier; and provide the signature to the requestor. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
Specification