×

Systems and methods to secure user identification

  • US 9,912,483 B2
  • Filed: 07/13/2016
  • Issued: 03/06/2018
  • Est. Priority Date: 09/21/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving, with a server from a user device, a communication including;

    a digital signature;

    user information of a user of the user device; and

    a first user identifier configured to identify the user of the user device among a plurality of first users of the server, wherein the first user identifier is generated by a computing device, separate from the server and the user device, based on a combination of;

    the user information of the user that is received in the computing device from the user device before the communication is received in the server; and

    a second user identifier of the user configured to identify the user of the user device among a plurality of second users of the computing device;

    extracting the second user identifier from the first user identifier; and

    validating an integrity of the communication based on the first user identifier, the second user identifier extracted from the first user identifier, and the user information of the user received in the communication, wherein validating the integrity of the communication comprises;

    combining, with the server, the second user identifier extracted from the first user identifier and the user information of the user received in the communication with a secret shared between the server and the computing device,generating, with the server, a combined dataset based on combining the second user identifier and the user information of the user with the secret,applying, with the server, a hash function to the combined dataset,generating, with the server, a hash result based on applying the hash function to the combined dataset, andcomparing, with the server, the hash result to the digital signature, anddetermining, with the server, whether the hash result matches the digital signature based on comparing the hash result to the digital signature; and

    determining to grant access to a service associated with the server based on validating the integrity of the communication.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×