Strong authentication using authentication objects
First Claim
Patent Images
1. A computer-implemented method, comprising:
- generating, based at least in part on data associated with a first user, a structured collection of information, the data being usable for at least one mode of authentication with a service provider system;
storing the structured collection such that the structured collection is usable at least in part to authenticate an identity of the first user with the service provider system as a result of selection, by a second user, of a graphical representation of the structured collection from a graphical user interface;
displaying the graphical user interface, the graphical user interface making available for selection a plurality of graphical representations of structured collections sufficient for authentication with service provider systems to which the plurality of graphical representations corresponds; and
in response to receiving the selection, by the second user, of the graphical representation from an input device, authenticating the identity of the first user by;
obtaining the structured collection; and
performing a set of actions associated with the structured collection that includes providing the data associated with the first user to the service provider system.
1 Assignment
0 Petitions
Accused Products
Abstract
Representations of authentication objects are provided for selection via an interface. An authentication object may be generated to include information proving possession of a user of an item, such as a one-time password token or a physical trait. A selected authentication object may contain information sufficient for authentication with a corresponding system. The interface may provide multiple representations of authentication objects that are usable with different service providers.
114 Citations
25 Claims
-
1. A computer-implemented method, comprising:
-
generating, based at least in part on data associated with a first user, a structured collection of information, the data being usable for at least one mode of authentication with a service provider system; storing the structured collection such that the structured collection is usable at least in part to authenticate an identity of the first user with the service provider system as a result of selection, by a second user, of a graphical representation of the structured collection from a graphical user interface; displaying the graphical user interface, the graphical user interface making available for selection a plurality of graphical representations of structured collections sufficient for authentication with service provider systems to which the plurality of graphical representations corresponds; and in response to receiving the selection, by the second user, of the graphical representation from an input device, authenticating the identity of the first user by; obtaining the structured collection; and performing a set of actions associated with the structured collection that includes providing the data associated with the first user to the service provider system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising:
-
one or more processors; and memory including executable instructions that, as a result of execution by the one or more processors, cause the system to; generate, based at least in part on data obtained from a first user, a structured collection of information, the data being usable for at least one mode of authentication with a service provider system; store the structured collection such that the structured collection is usable at least in part to authenticate an identity of the first user with the service provider system as a result of selection, by a second user, of a graphical representation of the structured collection from a graphical user interface; display the graphical user interface, the graphical user interface making available for selection a plurality of graphical representations of structured collections sufficient for authentication with service provider systems to which the plurality of graphical representations corresponds; and in response to receipt of the selection, by the second user, of the graphical representation from an input device, authenticate the identity of the first user to further cause the system to; obtain the structured collection; and perform a set of actions associated with the structured collection that includes providing the data obtained from the first user to the service provider system. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of execution by one or more processors of a computer system, cause the computer system to at least:
-
generate, based at least in part on data obtained from a first user, a structured collection of information, the data being usable for at least one mode of authentication with a service provider system; store the structured collection such that the structured collection is usable at least in part to authenticate an identity of the first user with the service provider system as a result of selection, by a second user, of a representation of the structured collection from a graphical user interface; display an interface, the graphical user interface making available for selection a plurality of representations of structured collections sufficient for authentication with service provider systems to which the plurality of representations corresponds; and in response to receipt of the selection, by the second user, of the representation from an input device, authenticate the identity of the first user, further causing the computer system to; obtain the structured collection; and perform a set of actions associated with the structured collection that includes providing the data obtained from the first user to the service provider system. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification