×

Strong authentication using authentication objects

  • US 10,049,202 B1
  • Filed: 03/25/2014
  • Issued: 08/14/2018
  • Est. Priority Date: 03/25/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • generating, based at least in part on data associated with a first user, a structured collection of information, the data being usable for at least one mode of authentication with a service provider system;

    storing the structured collection such that the structured collection is usable at least in part to authenticate an identity of the first user with the service provider system as a result of selection, by a second user, of a graphical representation of the structured collection from a graphical user interface;

    displaying the graphical user interface, the graphical user interface making available for selection a plurality of graphical representations of structured collections sufficient for authentication with service provider systems to which the plurality of graphical representations corresponds; and

    in response to receiving the selection, by the second user, of the graphical representation from an input device, authenticating the identity of the first user by;

    obtaining the structured collection; and

    performing a set of actions associated with the structured collection that includes providing the data associated with the first user to the service provider system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×