×

Systems and methods to authenticate users and/or control access made by users on a computer network using identity services

  • US 9,888,007 B2
  • Filed: 03/20/2017
  • Issued: 02/06/2018
  • Est. Priority Date: 05/13/2016
  • Status: Active Grant
First Claim
Patent Images

1. A controller for user authentication and access control, the controller comprising:

  • at least one microprocessor;

    a network interface controlled by the at least one microprocessor to communicate over a computer network with;

    at least one computing site, andat least one identity service, wherein the identity service stores identification information of a user and is configured to communicate with the user for identity protection; and

    memory coupled with the at least one microprocessor and storing;

    graph data representing a graph having;

    nodes representing data elements associated with accesses made using an access token, andlinks among the nodes representing connections between the data elements associated with the accesses made using the access token; and

    instructions which, when executed by the at least one microprocessor, cause the controller to;

    receive, from the computing site, input data specifying details of an access made using the access token;

    determine, from the input data;

    a device identity representing a user device from which the access is made using the access token, anda user identity representing the user who uses the user device to make the access using the access token;

    update the graph according to the input data;

    identify a connection in the graph resulting from updating the graph according to the input data, wherein the connection identified in the graph is one of;

    a connection between a node representing the device identity and a node representing the user identity;

    a connection to a shipping address added in the updating of the graph; and

    a connection to an access token added in the updating of the graph;

    transmit a query over the network to the identity service, the query causing the identity service to verify association of data elements corresponding to the connection identified in the graph;

    receive, over the network and from the identity service, a validation responsive to the query; and

    process, based on the validation, the access made using the access token.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×