Patent classifications
G06F21/33
SYSTEMS AND METHODS FOR SECURE ONLINE CREDENTIAL AUTHENTICATION
Systems, methods, and non-transitory computer-readable medium are disclosed includes for secure online credential authentication. One method includes receiving, over an electronic network, identification information from an identity provider; accessing, from a database, previously stored hashed identification information stored in association with a previous identity provider; comparing the identification information to previously stored hashed identification information; and storing the identification information in association with the identity provider that provided the identification information in the database when the hashed identification information does not match previously stored hashed identification information.
SYSTEMS AND METHODS FOR USE IN PROVISIONING CREDENTIALS
Systems and methods are provided for provisioning identity credentials based on interactions with verified or trusted users. One exemplary computer-implemented method includes receiving a request for a digital identity from a user, where the request includes identifying information for the user and a verified user identifier, and transmitting, to a verified user associated with the verified user identifier, an attestation request for the user. The method also includes receiving, from the verified user, an attestation in response to the attestation request with regard to at least some of the identifying information for the user, generating a digital identity for the user based on a number of attestations of the identifying information for the user, and sharing a digital identity notice with the user including an identifier for the user, whereby the user is permitted to share the digital identity with a relying party via the identifier.
CONTROL APPARATUS, CONTROL METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
A control apparatus (2000) acquires a certificate image (30) being an image of an identification card. The control apparatus (2000) outputs screen data (70) of a screen (60) including the certificate image (30). The control apparatus (2000) acquires a user image (50) generated by capturing an image performed in a state where the screen (60) is displayed.
CONTROL APPARATUS, CONTROL METHOD, AND NON-TRANSITORY COMPUTER READABLE MEDIUM
A control apparatus (2000) acquires a certificate image (30) being an image of an identification card. The control apparatus (2000) outputs screen data (70) of a screen (60) including the certificate image (30). The control apparatus (2000) acquires a user image (50) generated by capturing an image performed in a state where the screen (60) is displayed.
COORDINATION PLATFORM FOR GENERATING AND MANAGING AUTHORITY TOKENS
Aspects of the disclosure relate to using secure authentication tokens to grant power of attorney. A computing platform may receive user input indicating a task and requesting that a power of attorney be granted to an individual. The computing platform may generate an authority token granting the individual the power of attorney to perform the task, and may send the authority token, along with task information indicating the task, to the individual. The computing platform may receive a validation request including the authority token and the task information. Based on successful validation, the computing platform may send validation information to an event processing system. After receiving confirmation that the task has been performed by the individual, the computing platform may update dashboard information to indicate that the task has been completed, which may cause the user device to display a dashboard indicating completion of the task.
Method for using and revoking authentication information and blockchain-based server using the same
A method for using authentication information is provided. The method includes steps of: (a) a managing server, if a request for using the authentication information is acquired, acquiring a transaction ID corresponding to a specific user's identification information; (b) the managing server acquiring an output of a specific transaction corresponding to the transaction ID from a blockchain; (c) the managing server determining revocation of the authentication information by referring to the output of the specific transaction; and (d) the managing server supporting a communication by providing the specific user's public key in the output of the specific transaction, if the authentication information is not revoked, and if (i) a hash value of the specific user's identification information included in the output of the specific transaction or its processed value corresponds to (ii) a hash value of the specific user's identification information pre-stored in a certain database or its processed value.
Method for using and revoking authentication information and blockchain-based server using the same
A method for using authentication information is provided. The method includes steps of: (a) a managing server, if a request for using the authentication information is acquired, acquiring a transaction ID corresponding to a specific user's identification information; (b) the managing server acquiring an output of a specific transaction corresponding to the transaction ID from a blockchain; (c) the managing server determining revocation of the authentication information by referring to the output of the specific transaction; and (d) the managing server supporting a communication by providing the specific user's public key in the output of the specific transaction, if the authentication information is not revoked, and if (i) a hash value of the specific user's identification information included in the output of the specific transaction or its processed value corresponds to (ii) a hash value of the specific user's identification information pre-stored in a certain database or its processed value.
TERMINAL DEVICE, METHOD, AND STORAGE MEDIUM
A terminal device according to this disclosure is a terminal device including a controlling portion, a storage portion, and a communication portion. The controlling portion stores electronic tickets in the storage portion. The controlling portion executes authentication of a user through communication with a server. In a case where the user is authenticated successfully, the controlling portion causes an electronic ticket associated with the user to be displayable from among the electronic tickets stored in the storage portion. In a case where a non-communicable state in which the communication with the server is not performable is established, the controlling portion causes a corresponding electronic ticket to be displayable from among the electronic tickets stored in the storage portion.
TERMINAL DEVICE, METHOD, AND STORAGE MEDIUM
A terminal device according to this disclosure is a terminal device including a controlling portion, a storage portion, and a communication portion. The controlling portion stores electronic tickets in the storage portion. The controlling portion executes authentication of a user through communication with a server. In a case where the user is authenticated successfully, the controlling portion causes an electronic ticket associated with the user to be displayable from among the electronic tickets stored in the storage portion. In a case where a non-communicable state in which the communication with the server is not performable is established, the controlling portion causes a corresponding electronic ticket to be displayable from among the electronic tickets stored in the storage portion.
ASSIGNMENT OF SERVICE IDENTITY FOR INFORMATION HANDLING SYSTEMS
System and method are provided for assigning a service identifier for use by an IHS (Information Handling System), where a new service identifier may be assigned to the IHS due to replacement of hardware of the IHS. The IHS is provisioned with an inventory certificate that identifies hardware components of the IHS, including a service identifier for the IHS. Support provided for the IHS is tracked based on this service identifier. A hardware component of the IHS is removed, where the service identifier is assigned to this removed hardware component. A replacement hardware component is installed in the IHS. An updated inventory certificate is generated that assigns a new service identifier to the replacement hardware component installed in the IHS. The IHS is provisioned with the updated inventory certificate that specifies the new service identifier. Support provided for the IHS is now tracked based on the new service identifier.