×

User authentication using unique hidden identifiers

  • US 9,306,926 B2
  • Filed: 03/11/2014
  • Issued: 04/05/2016
  • Est. Priority Date: 03/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer readable medium including instructions that are configured to cause a computer system to allow a first user to authenticate a second user in the computer system without disclosing and storing valuable personal information in a personal information database by performing a method comprising:

  • a first user device prompting the first user to create a first human readable identifier signifying a first network account on a network including at least one server;

    the first user device creating the first network account, wherein account creation includes;

    the first user device transmitting the first human readable identifier to the server;

    the server receiving the first human readable identifier and assigning a first unique hidden identifier associated with the first human readable identifier to the first user device and storing the associated first human readable and first unique hidden identifiers in an account database; and

    the server transmitting the first unique identifier to the first device;

    the server assigning a first current session identifier to the first user device upon first network account creation or the first user logging into the system using a previously created first network account and storing the first current session identifier and the first human readable identifier in a current session database;

    the server transmitting the first current session identifier to the first user device; and

    the first user device adding contacts both directly and indirectly based on first user inputs,wherein adding contacts directly includes the first user device transmitting a first contact add request comprising the first human readable identifier and the first current session identifier to a second user device for an authentication by confirmation,wherein adding contacts indirectly includes;

    the first user device, having already been authenticated by a third user device that has created a group comprising the first human readable identifier and a fourth human readable identifier associated with a fourth user device previously authenticated by the third user device, transmits a second contact add request to the fourth user,wherein human readable identifiers are used to identify added and potential contacts to user and wherein unique hidden identifiers of users are unknown to all users.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×