×

User authentication using unique hidden identifiers

  • US 9,967,245 B2
  • Filed: 02/23/2016
  • Issued: 05/08/2018
  • Est. Priority Date: 03/15/2013
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer readable medium including instructions that are configured to cause a computer system to add contacts and selectively authenticate a third-party platform by causing a processor of a first user device to perform a method including steps, comprising:

  • the user device creating a network account signified by a human readable identifier, wherein account creation includes a server assigning a unique device identifier to the user device and associating the unique device identifier with the human readable identifier in a database, where the unique device identifier is hidden from a first user of the first user device;

    the user device prompting the first user to add contacts, where human readable identifiers are used to identify added contacts to the first user;

    the user device selectively authenticating the third-party platform by;

    selectively opening the third-party platform on a user device;

    opening an authentication platform on the first user device, wherein on the authentication platform the human readable identifier is associated with the unique device identifier;

    receiving, by the authentication platform, a first session identifier for a session on the third-party platform;

    presenting a login request to the first user via a first user interface for the authentication platform to confirm the authenticated session on the third-party platform; and

    upon confirmation by the first user via the first user interface, authenticating the third-party platform by;

    sending, using the authentication platform, the session identifier and unique device identifier to the server; and

    associating, at the server, the session identifier and the unique device identifier.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×