Identity verification using key pairs
First Claim
Patent Images
1. A method, comprising:
- receiving, by a server, an electronic login request associated with a user of a first device;
generating, by the server, a first key pair in response to the electronic login request, the first key pair associated with an identity of the user;
receiving, by the server, an electronic user identification request associated with a second device, the electronic user identification request seeking a verification of the identity purported to be the user accessing the second device using a second key pair;
retrieving, by the server, the first key pair; and
verifying, by the server, the identity of the user accessing the second device based on the first key pair.
2 Assignments
0 Petitions
Accused Products
Abstract
User identity is verified as a user migrates among different devices. When the user migrates from a device to a different device, key pairs may be generated. If the key pairs validate, the user may be verified to the different device.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a server, an electronic login request associated with a user of a first device; generating, by the server, a first key pair in response to the electronic login request, the first key pair associated with an identity of the user; receiving, by the server, an electronic user identification request associated with a second device, the electronic user identification request seeking a verification of the identity purported to be the user accessing the second device using a second key pair; retrieving, by the server, the first key pair; and verifying, by the server, the identity of the user accessing the second device based on the first key pair. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a hardware processor; and a memory device, the memory device storing code, the code when executed causing the hardware processor to perform operations, the operations comprising; receiving an electronic login request associated with a user of a first device; generating a first key pair in response to the electronic login request, the first key pair associated with an identity of the user; receiving an electronic user identification request associated with a second device, the electronic user identification request seeking verification of the identity purported to be the user accessing the second device using a second key pair; retrieving the first key pair; and verifying the identity of the user accessing the second device based on the first key pair. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A memory device storing instructions that when executed cause a hardware processor to perform operations, the operations comprising:
-
receiving an electronic login request associated with a user of a first device; generating a first key pair in response to the electronic login request, the first key pair associated with an identity of the user; receiving an electronic user identification request associated with a second device, the electronic user identification request seeking verification of the identity purported to be the user accessing the second device using a second key pair; retrieving the first key pair; and verifying the identity of the user accessing the second device based on the first key pair. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification