User authentication using unique hidden identifiers
First Claim
Patent Images
1. A non-transitory computer readable medium including instructions that are configured to cause a computer system to add contacts and selectively authenticate a third-party platform by causing a processor of a first user device to perform a method including steps, comprising:
- the user device creating a network account signified by a human readable identifier, wherein account creation includes a server assigning a unique device identifier to the user device and associating the unique device identifier with the human readable identifier in a database, where the unique device identifier is hidden from a first user of the first user device;
the user device prompting the first user to add contacts, where human readable identifiers are used to identify added contacts to the first user;
the user device selectively authenticating the third-party platform by;
selectively opening the third-party platform on a user device;
opening an authentication platform on the first user device, wherein on the authentication platform the human readable identifier is associated with the unique device identifier;
receiving, by the authentication platform, a first session identifier for a session on the third-party platform;
presenting a login request to the first user via a first user interface for the authentication platform to confirm the authenticated session on the third-party platform; and
upon confirmation by the first user via the first user interface, authenticating the third-party platform by;
sending, using the authentication platform, the session identifier and unique device identifier to the server; and
associating, at the server, the session identifier and the unique device identifier.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for user authentication using hidden unique identifiers in networks. In some example embodiments these systems and methods only require a single human readable identifier be provided and minimize personal information exposure in the event of a network breach.
47 Citations
9 Claims
-
1. A non-transitory computer readable medium including instructions that are configured to cause a computer system to add contacts and selectively authenticate a third-party platform by causing a processor of a first user device to perform a method including steps, comprising:
-
the user device creating a network account signified by a human readable identifier, wherein account creation includes a server assigning a unique device identifier to the user device and associating the unique device identifier with the human readable identifier in a database, where the unique device identifier is hidden from a first user of the first user device; the user device prompting the first user to add contacts, where human readable identifiers are used to identify added contacts to the first user; the user device selectively authenticating the third-party platform by; selectively opening the third-party platform on a user device; opening an authentication platform on the first user device, wherein on the authentication platform the human readable identifier is associated with the unique device identifier; receiving, by the authentication platform, a first session identifier for a session on the third-party platform; presenting a login request to the first user via a first user interface for the authentication platform to confirm the authenticated session on the third-party platform; and upon confirmation by the first user via the first user interface, authenticating the third-party platform by; sending, using the authentication platform, the session identifier and unique device identifier to the server; and associating, at the server, the session identifier and the unique device identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification