WO2010017066A2 - Form filling with digital identities, and automatic password generation - Google Patents
Form filling with digital identities, and automatic password generation Download PDFInfo
- Publication number
- WO2010017066A2 WO2010017066A2 PCT/US2009/051996 US2009051996W WO2010017066A2 WO 2010017066 A2 WO2010017066 A2 WO 2010017066A2 US 2009051996 W US2009051996 W US 2009051996W WO 2010017066 A2 WO2010017066 A2 WO 2010017066A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computing system
- website
- user
- username
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Definitions
- a website will frequently request that a user provide personal information in order to use a service that the website provides. For example, the website may gather personal information to register a new account for the user, to authenticate the user, or to process the user's payment. In order to gather this information from the user, the website will often present the user with a "form".
- a form, or web form is a structured web document with spaces, called “form fields”, reserved for entering information. Forms are a ubiquitous means for gathering user input on the World Wide Web.
- An identity thief may present a user with a web form— often resembling or exactly mirroring a web form of a trusted website — that requests personal information. The unsuspecting user may then provide the criminal with passwords, credit card numbers, or other personal information.
- the identity metasystem provides a secure mechanism by which a user can manage and use digital identities.
- the identity metasystem makes digital information exchange more uniform and user-friendly, and helps prevent identity theft by providing a secure means for users to provide information over the internet to verifiable parties.
- Some of the user's digital identities may be self-issued, whereas others may be provided by a trusted third-party.
- the entity whether it be the user or a third- party— that issues a digital identity is called an "identity provider”.
- a party, such as a website, that requests and uses information from a digital identity is referred to as a "relying party”.
- identity selector software will allow the user to select an information card that represents a digital identity to be sent to the site. Once a digital identity is selected, the identity selector facilitates the secure exchange of encrypted packages of digital identity data called "security tokens" between the identity provider and the relying party.
- identity selector facilitates the secure exchange of encrypted packages of digital identity data called "security tokens" between the identity provider and the relying party.
- MICROSOFT ® WINDOWS CARDSPACE ® is an example of identity selector software.
- Embodiments described herein relate to the use of digital identities to populate and submit form field data. Embodiments such as these have the potential to enable websites to be compatible with digital identities with less development effort than that involved in making a website compatible with the identity metasystem as it has previously been implemented. Embodiments described herein also provide a mechanism for the automatic generation and maintenance of usernames and passwords.
- a computer application obtains a form field specification from a website that has a form.
- the form field specification identifies form fields of the form, to which data can be provided using a digital identity. Once the form field specification is obtained, the computer application prompts a user to select or create a digital identity.
- a computer application uses this digital identity to obtain data with which to populate one or more of the form fields of the form.
- the computer application populates the form fields of the form with the obtained data, and then the form field data is submitted to the website.
- a computer application obtains username and password parameters from a website or an application.
- the computer application automatically generates a username and password that meet the specified parameters.
- the generated username and password pair is securely stored by the computer application.
- the username and password pair can be recalled by the computer application for future authentication with the website or application.
- Figure 2 illustrates an environment in which techniques for form filling using digital identities and in which automatic passwords techniques may be accomplished;
- Figure 3 illustrates a flowchart of a method for web form filling using data obtained with digital identities;
- Figure 4 illustrates a flowchart of a method for the automatic generation and storage of secure username and password pairs
- Figure 5 illustrates a flowchart of a method that incorporates both web form filling and automatic password generation using digital identities.
- At least some embodiments described herein relate to form filling using digital identities and/or to the automatic generation of secure passwords.
- Embodiments described herein have the potential to enable websites to be compatible with digital identities with less development effort than that involved in making a website compatible with the identity metasystem as it has previously been implemented.
- embodiments described herein may streamline and increase the security of passwords-based authentication mechanisms and relieve computer users of burdens involved with password management for multiple websites and applications.
- a website that has a form makes information available about the form fields that are contained within the form.
- the information may optionally include certain restrictions about the types and formats of data that can be input to the form fields.
- a user is prompted to select or create a digital identity.
- the selected digital identity may be associated with certain information about the user, and may be used to populate the various form fields of the form.
- the data from the selected digital identity is formatted such that it meets any restrictions that have been specified by the website. The data is then submitted to the website.
- a secure username and password pair may be generated to use with registration at a website or application and for future authentication at the website or application.
- the secure username and password pair may be associated with a digital identity.
- Figure 1 illustrates an example computing system 100.
- Computing systems are now increasingly taking a wide variety of forms. Computing systems may, for example, be handheld devices, appliances, laptop computers, desktop computers, mainframes, distributed computing systems, or even devices that have not conventionally considered a computing system.
- computing system is defined broadly as including any device or system (or combination thereof) that includes at least one processor, and a memory capable of having thereon computer-executable instructions that may be executed by the processor.
- the memory may take any form and may depend on the nature and form of the computing system.
- a computing system may be distributed over a network environment and may include multiple constituent computing systems.
- a computing system 100 typically includes at least one processing unit 102 and memory 104.
- the memory 104 may be physical system memory, which may be volatile, non-volatile, or some combination of the two.
- the term “memory” may also be used herein to refer to non- volatile mass storage such as physical storage media.
- module can refer to software objects or routines that execute on the computing system.
- the different components, modules, engines, and services described herein may be implemented as objects or processes that execute on the computing system (e.g., as separate threads).
- Computing system 100 may also contain communication channels 108 that allow the computing system 100 to communicate with other message processors over, for example, network 110.
- Communication channels 108 are examples of communications media.
- Communications media typically embody computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave or other transport mechanism and include any information-delivery media.
- communications media include wired media, such as wired networks and direct-wired connections, and wireless media such as acoustic, radio, infrared, and other wireless media.
- the term "computer-readable media" as used herein includes both storage media and communications media.
- Embodiments within the scope of the present invention also include computer- readable media for carrying or having computer-executable instructions or data structures stored thereon.
- Such computer-readable media can be any available media that can be accessed by a general purpose or special purpose computer.
- Such computer-readable media can comprise physical storage and/or memory media such as RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer.
- Computer-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions.
- Figure 2 illustrates a sample environment 200 in which techniques for form filling using digital identities as described herein may occur.
- the techniques for automated secure password generation may also be performed in the sample environment 200.
- Figure 2 contains a client computing system 201 that may be, for example, structured like the computing system 100 of Figure 1.
- the client computing system 201 is connected to a network 205.
- the network 205 may be the internet, or alternatively, the network 205 may be any network which connects the client computing system 201 to other components of the environment that are shown in Figure 2 and described hereafter.
- a web server 202 which may be structured like the computing system 100 of Figure 1, contains computer executable instructions by which the web server 202 hosts a web site 210 that can be accessed by the client computer 201 through the network 205.
- the website 210 may contain one or more web pages 21 IA-D (sometimes referred to collectively in this description as "web pages 211").
- Each of the web pages 211 may contain metadata 215, and visible elements 216 which may include both visible interactive elements and visible non-interactive elements.
- the web pages 211 may, in the traditional manner, be described using HTML, or, alternatively, may be provided to the client computing system in other languages, scripts, protocols or formats that are known in the art or that are to be developed in the future.
- the web site 210 may be hosted across multiple web servers that may be similar to the depicted web server 202. Additionally, the website 210 and/or web pages 211 may be provided through a distributed architecture, such as, for example, a distributed architecture that implements mechanisms which allow for web pages and other content to be mirrored and distributed across multiple web servers in order to facilitate a higher number of users, higher bandwidth availability, faster connection speeds, and so forth. Indeed, the techniques described herein may be compatible with any environment that involves forms, regardless of the number or type of web servers (if any) that implement the environment, and regardless of the means by which the web pages and other content might be distributed to the end-users in the environment.
- the web site 210 contains a form that contains multiple form fields.
- the form 212 is illustrated as including form fields 213A - 213D (referred to collectively as "form fields 213").
- form fields 213 are illustrated as including form fields 213A - 213D (referred to collectively as "form fields 213").
- web page 21 IA is shown in some detail, some or all of the features attributed to web page 21 IA may optionally be attributed to other web pages 211 as well. For instance, one or more of the other web pages 211 may also have a form. However, typically, the number, identity, and layout of form fields within a form may often differ from one form to another.
- a "form” is a structured document with spaces reserved for a user to input information
- a "form field” is a space in a form where a user or other entity can enter a specific item of information.
- the web page 21 IA of the web site 210 may also contain a form field specification 214 that references one or more (but not necessarily all) of the form fields 213.
- the form field specification 214 and the references contained therein provide information to the client computing system 201 that identifies the form fields that should be filled in by form filling methods and techniques described herein.
- the form 212, form fields 213 and form field specification 214 may all be contained within a single web page 21 IA, or, alternatively, may be parts of multiple web pages such as the illustrated web pages 211.
- the form 212, form fields 213, and form field specification 214 may be made available to the client computing system 201 through means other than conventional, graphically rendered web pages, such as through a direct information exchange between the web server 202 and the client computing system 201, or through applications, including web applications, that are not considered to be traditional web pages.
- the form field specification 214 may be included as part of the metadata 215 of the web page.
- the data in the form field specification 214 may be organized as any of multiple types of data structures that are known in the art, or that are yet to be developed. For example, one conventional mechanism is to organize data structures using markup language such as, for example, in an XML or HTML data structure. Alternatively, the form field specification 214 may simply be described within one or more tags within the markup language (such as HTML) that describes the web page.
- the form field specification 214 may be provided to the client computing system in a more direct manner through the network 205 such as through any of various means that are known in the art or have yet to be developed, including, for example, data packets sent across the network through a known protocol such as TCP or UDP.
- TCP Transmission Control Protocol
- UDP User Datagram Protocol
- the form field specification 214 might optionally specify one or more form field restrictions for the form fields that are referenced therein. These form field restrictions are often parameters or limitations on the data that can be input into the form fields that the form field specification 214 references. Examples of form field restrictions include (but are not limited to) the following: whether a specified form field is required or not, a minimum and/or maximum length restriction for data input to the form field, a required character set to be used when filling in the form field, required or prohibited character types, and so forth.
- a form field specification 214 may also include form field restrictions that are specific to username and password form fields that are referenced in the form field specification 214. This would be an example of a "username and password specification", as discussed below with respect to Figure 4.
- the client computing system 201 may display the visible elements 216 of the web page 21 IA in an implementation of web browser software 218 which contains computer- readable instructions that cause the client computing system 201 to perform, in addition to functionalities that are commonly performed by web browsers, the methods and techniques described for form filling using digital identities that are described in further detail hereinafter.
- a user 230 may interact with the client computing system 201, and particularly with the web browser software 218.
- embodiments described herein are described in conjunction with web browser software 218, it is understood that computer-executable code which causes the client computing system 201 to perform any of the techniques described herein may be incorporated into various types of computer applications, including applications implemented in software and/or hardware.
- the client computing system 201 includes one or more digital identity references 220A-E (referred to collectively as “digital identity references 220") which reference one or more digital identities that a user may have at her disposition.
- digital identity references 220 may be stored in the various computer-readable media that were described previously with respect to Figure 1.
- the digital identity references 220 may be stored in non- volatile storage media that is local to the client computing system 201, or alternatively, the digital identity references 220 may be stored on a portable device such as a flash memory drive or a smart card.
- a portable device such as a flash memory drive or a smart card.
- the digital identity references 220 contain information that allows computer- executable code, executed by the client computing system 201, to connect to one or more identity providers, as illustrated by identity providers 203 A-D & 203 S (referred to hereinafter as "identity providers 203").
- Identity providers 203 may be implemented in servers that are structured like the computing system 100 that is illustrated in Figure 1. A connection to these third-party identity providers is provided to the client computing system 201 through the network 205.
- third-party identity providers 203 A-D include government agencies which provide digital identities, credit card providers, clubs or groups in which the user 230 has a membership or affiliation, certificate issuing agencies such as VERISIGN ® INC., and so forth. These are only a few examples of third-party identity providers, as virtually any entity that provides information for a user in the form of a digital identity may be considered a third-party identity provider.
- digital identity reference 220E may reference self-issued digital identities which are issued by a self-issued identity provider 203S (also referred to as "self-issued identity provider software 203S").
- a self-issued identity provider 203 S may be implemented in computer executable code that resides in the memory of the client computing system 201 and that, when executed, allows a user 230 to create, store and/or access digital identities which contain some information about the user.
- the computer-executable code which comprises the self-issued identity provider 203 S may be incorporated as part of the web browser software 218, as part of the identity selector software 219 (discussed in detail below), as part of another software product, or, alternatively, as stand-alone software.
- This flexibility in the management of the self-issued identity provider 203 S is represented symbolically in Figure 2 by having the self-issued identity provider 203 S only partially overlap with the web browser software 218.
- the client computing system 201 may include identity selector software 219.
- the identity selector software 219 presents a graphical interface to the user 230 wherein graphical representations of the digital identity references 220 (and thereby the corresponding identities) are displayed.
- the identity selector software 219 also provides a means by which the user 230 may provide a selection from the graphical representations of digital identity references that are being displayed.
- the identity selector software 219 may be incorporated as part of the web browser software 218 or, alternatively, may be part of a separate or standalone application. This is symbolically represented in Figure 2 by having the identity selector software 219 be only partially overlapping with the web browser software 218. In some implementations, in which the identity selector software 219 is incorporated outside of web browser software 218, there may be no need for web browser software 218 to even be present on the client computing system 201.
- the digital identity references 220 may be presented to the user by the identity selector software 219 as information cards or other visual representations of digital identities.
- Each information card may provide the user with a visual display of information about the digital identities that the card represents.
- digital identities might represent a government issued digital identity that claims the user is a certain age.
- the digital identity reference might contain a reference to a government identity provider, which may be, for example, one of the third-party identity providers 203 A-D. In this example, suppose the government identity provider is willing to vouch for and verify the claim of the user's age.
- the information card that represents the digital identity reference might provide a graphical display that identifies to the user that the identity provider which provides the digital identity that the digital identity reference refers to has capabilities to issue an age-verification identity.
- Forms may be used in WORDPERFECT ® documents or in MICROSOFT ® OFFICE documents. Forms may be used in various web applications that are not typically though of as "web pages", such as web applications that are developed using MACROMEDIA ® FLASH® technology. Indeed, forms may be used in virtually any standalone or other computer application that requires a user to input data.
- identity metasystem a platform that involves methods for digital identity exchange, including the use of identity selectors and identity providers, is commonly known in the art as an "identity metasystem.”
- identity metasystem a platform that involves methods for digital identity exchange, including the use of identity selectors and identity providers.
- identity metasystem a platform that involves methods for digital identity exchange, including the use of identity selectors and identity providers.
- identity metasystem a platform that involves methods for digital identity exchange, including the use of identity selectors and identity providers.
- identity metasystem MICROSOFT ® WINDOWS CARDSPACE ® includes, among other things, an implementation of identity selector software which presents a user with information cards that contain references to one or more digital identities that are provided by identity providers.
- Figure 3 illustrates a method 300 for populating form fields with data obtained using a digital identity.
- the method 300 may be carried out in an environment similar to the environment 200 that is illustrated in Figure 2.
- One or more computing systems such as the client computing system 201 and other computing systems connected to the client computing system 201 through the network 205, may execute computer-executable instructions contained on computer-readable media which cause the computing system(s) to perform the acts described in the method 300.
- the method 300 includes an act 301 of obtaining, from a web site, a form field specification that specifies form fields of a form.
- the client computing system 201 may obtain the form field specification 214 of the form 212 from the web site 210.
- the form 212 specifies a number of form fields 213, and that the form field specification 214 may reference one or more of the form fields 213.
- the form field specification 214 may optionally specify one or more form field restrictions for one or more of the form fields 213 of the form 212, as previously discussed.
- the form field specification 214 obtained in act 301 may refer to form fields 213 of a form (referred to herein as a "registration form") 212 that is for registering a new account for the user 230 at the web site 210.
- the web site 210 may, alternatively or additionally, contain another form (referred to herein as a "login form”), also of a similar format as form 212, that is for authenticating or logging in to the web site 210.
- forms may be used for any one or more of these or a variety of other purposes.
- one of the form fields 213 could be a password field — for a new password in the case of a registration form or for an existing password in the case of a login form.
- form fields 213 could be a user name field, credit card information fields, a passport identifier field, a country of citizenship field, an age field, a marital status field, address information fields, criminal record fields, occupation fields, and so forth.
- the principles described herein are not limited to the types of information that are described in association with the form fields 213.
- the form fields 213 may consist of textual information.
- the information might additionally or alternatively be a file, a list, a graphically displayed object, a calendar date selection, or any other type of information.
- the principles described herein have no limit to the type of the information that is utilized, and embodiments may utilize one or more of a variety of different types of information.
- the method 300 illustrated in Figure 3 also includes an act 302 of prompting a user of the computing system to either select or create a digital identity that will be used to provide at least one value into at least one of the form fields of the form.
- the user 230 may be prompted by the identity selector software 219 to select a digital identity reference from the one or more digital identity references 220 that are available to the user.
- the digital identity references 220 may be presented to the user in the form of information cards or other graphical representations of digital identities, and each graphical representation may present to the user 230, for example, a brief synopsis of the digital identity that the graphical representation represents.
- the user 230 may choose to create a new digital identity, rather than to select a pre-existing digital identity.
- the self-issued identity provider software 203 S may be activated, and the user 230 may provide input — for example, through a graphical interface— that the self-issued identity provider software 203 S may use to create a digital identity to be used in the method 300.
- the user 230 may choose to select one of an existing set of digital identity references 220A-E.
- the chosen digital identity reference may reference an existing digital identity from a third party identity provider 203 A-D or alternatively may reference a digital identity from the self-issued identity provider 203 S.
- the next act 303 in the method 300 consists of obtaining, using the digital identity reference that the user selected or created in the previous act 302, data that may be used to populate one or more of the form fields 213 of the form 212.
- data that may be used to populate one or more of the form fields 213 of the form 212.
- the client computing system 201 connects through the network 205 to the third-party identity provider 203 A that the selected digital identity reference 220A refers to.
- the third party identity provider 220A may then provide the client computing system 201 with the data fields (also known as "claims") that the selected digital identity contains.
- the data may be transferred through some secure means or protocol that is known in the art or that is developed in the future.
- the data may be packaged into any of a variety of different types of packages that are collectively referred to as security tokens, both in this description and in the art.
- a security token may be any type of data package that is known in the art or which may be developed in the future, including secure data packages such as, for example, SAML tokens.
- the self- issued identity provider 203 S that resides on the client computing system 201 may provide a security token that represents data included within the user-selected or user-created digital identity.
- This data may be encapsulated in a package that may be similar to a security token, as discussed in the previous paragraph.
- the data obtained from the self-issued digital identity may be communicated directly to software that is performing the method 300.
- the method 300 includes an act 304 of populating one or more of the form fields 213 specified in the form field specification 214 with the obtained data.
- the data received in the previous act 303 may need to be extracted from a security token and/or transformed before it can be used to populate one of the form fields 213.
- the security token may need to be "opened” and/or parsed in order to extract simple textual data or other data (in the case of non-textual form fields) that is a compatible input to the form fields 213 that are specified in the form specification 214.
- the data may be formatted or transformed so that it meets any or all of the optional form field restrictions that are indicated in the form field specification 214.
- the method 300 involves an act 305 of submitting the populated form fields to the web site 210.
- This act 305 of data submission may be performed by the client computing system 201 automatically and without further user interaction beyond the user interaction that may have occurred when the user 230 selected a digital identity in a previous act 302. Alternatively, the user 230 may need to provide some further interaction to the client computing system 201 before the populated form fields may be submitted.
- the user 230 may need to click a confirmation button in a dialog box in order to confirm that the form 212 is ready to be submitted.
- clicking a button in a dialog box is one common example of a user interaction, the user may be required to provide one or more of many interactions that are possible between the user 230 and the client computing system 201 before the data is submitted to the website 210 in this act 305.
- the manner by which the populated form fields are submitted to the web server 202 may involve the web browser software 218 on the client computing system submitting the data to the web server 202 in the same way that the data would have been submitted had the user 230 manually entered the data into the form 212 and submitted the form to the website 230.
- the web browser software 218 may simulate a user clicking a "submit" button or interacting with a similar user-interface element.
- the web browser software 218 may simply send an HTTP request to the web server 202 that contains the populated form field information.
- the web browser software 218 and/or identity selector software 219 may attempt to detect that the web site 210 is compatible with the techniques of method 300 before proceeding with the method 300. As one example of how this compatibility detection may occur, the web browsing software 218 may detect that the web page 21 IA contains a properly formatted form field specification 214 before proceeding with the execution of the method 300.
- the web browsing software 218 may recognize that the web page 21 IA does not have a properly formatted form field specification, and will not proceed with the execution of the method 300.
- This form field specification detection technique is simply one example of how the methods and techniques described herein may be selectively performed based on the existence of some condition; the techniques described herein could potentially depend on one or more conditions that may be different than or in addition to the one used in this illustrative example.
- the detection of some condition such as is described in the example described in this paragraph, is entirely optional for method 300 and other techniques described herein; embodiments may exist which do not depend on the existence of any condition at all.
- Figure 4 illustrates a flowchart of a method 400 for automatically and securely generating a username and password pair.
- the method 400 includes an act 401 of obtaining a username and password specification of an application or website.
- the username and password specification may be contained in the form field specification 214 or may be communicated by other means of transferring data across a network 205, as discussed previously.
- the username and password specification could comprise some other structure by which the application indicates that a username and password are requested to access at least some of the functionality of the application. Additionally, the username and password specification may optionally specify various restrictions on usernames and passwords that are to be provided to the application or website.
- the method 400 includes an act 402 of automatically generating a username and password pair which conforms to the obtained username and password specification.
- the generated username and password should meet all of the restrictions, limitations and parameters that were included in the username and password specification, if any were included at all.
- the generation process could optionally also impose its own restrictions on usernames and passwords that may be generated by the process, in addition to restrictions that are specified in the username and password specification.
- the generation process could impose its own restriction against using dictionary words or names, or it could always make passwords that are the maximum length supported by the website or application.
- the restrictions of the specification are added upon or made more restrictive by the generation process.
- the generation process could impose a restriction that any generated username and password pair should be unique from username and password pairs previously created for other applications or websites during the generation process.
- the generation process 400 includes an act 403 of storing the generated username and password such that it can be recalled by the computing system for future authentication at the application or website.
- the username and password may be stored either locally, or, alternatively, on a device or storage media that is not included within the client computing system 201. There is no limit to how the username and password may be stored.
- the username and password may be stored in an encrypted and secure manner such that only the application which generated the pair can decrypt the stored username and password pair for future use.
- the username and password pair may be stored in more than one place; for example, the user may have the stored username and password on both the client computing system and a portable computing device such as a laptop, PDA, or cell phone.
- the pair may be securely stored on portable storage media such as flash memory or on a portable device such as a smart card, such that the generated username and password pair can be used on any computer which the user 230 has occasion to access.
- portable storage media such as flash memory
- a portable device such as a smart card
- the generated username and password pair may be used to automatically authenticate to the website or application for which the pair was generated.
- computer executable code on the client computing system 201 may cause that the generated pair be used to automatically login to the web site 210.
- the generated username and password pair may be used in act 411 to automatically login to the application.
- the computing system may prompt the user (as illustrated in the act 421) to select or create a digital identity to associate with the generated username and password pair. Once the user selects or creates a digital identity to associate with the generated pair, the generated pair is associated with the digital identity as illustrated in act 422. In addition to being associated with the digital identity, the generated pair may optionally be associated with the website such that, when the website is visited subsequently, the username and password have a known association with the website and this association may be used to provide additional authentication functionality to applications such as the web browser software 218 or the identity selector software 219.
- the optional acts 421 and 422 could be performed before the act 403 of storing the generated username and password pair.
- the optional acts 421-423 as an example of a future authentication use, when the user 230 navigates to a web site 210 which is compatible with techniques described herein and the web site 210 requires that the user 230 authenticate in order to access certain features contained therein, the user is prompted in act 423 to select a digital identity. This prompting to select a digital identity may be done in a similar manner as that described previously with respect to act 302 of the method 300.
- the act 423 which includes using the generated pair for automatic authentication at the web site 210 after the user 230 has selected a digital identity, may involve the username and password pair being used to populate form fields 213 which are then submitted to the website 210, similarly to the techniques for populating and submitting form field data that are illustrated in acts 303-305 of method 300, as illustrated in Figure 3.
- One advantage of embodiments which involve the method 400 illustrated in Figure 4 is that the user 230 would not need to remember or write down the generated username and password pair. Additionally, it would be difficult or impossible for another person to obtain the username and password for unauthorized use.
- the method 400 could be used to supply a username and a password for a web site, in which case the environment of Figure 2 applies.
- the username and password may be supplied to the web site 210 through a form 212.
- the techniques of Figure 4 may be utilized in conjunction with a method such as that of Figure 3.
- a username and password specification may be obtained from the web site 210 as part of the form field specification 214 obtained in act 301.
- the generated username and password may be submitted to the form 212 in a similar manner as is illustrated in act 305 and described herein with reference to act 305.
- the client computing system 201 may include web browser software 218, and the method 400 may be executed by computer executable code that is executed as part of or in conjunction with the web browser software 218 or identity selector software 219.
- the method 400 could be executed by a stand-alone application which contains computer executable instructions that perform the method, or the method could be executed by a code module that is part of a larger application or code library.
- Such a method 500 is illustrated in Figure 5 and may allow for significant automation of both the registration and the authentication processes that are commonly used to access features provided by the website 210, among other benefits.
- the method 500 may include an act 501 of obtaining a form field specification 214, which specifies a plurality of form fields 213 of a form 212.
- the form field specification 214 may include form field restrictions for one or more of the form fields 213 of the form 212, as has been previously described.
- This act 501 is similar to the act 301 illustrated in Figure 3.
- the user 230 is prompted by the client computing system 201 to select or create a digital identity.
- the digital identity is used to obtain data to populate at least one of the form fields 213 of the form 212 that are specified in the form field specification 214.
- This may involve the use of digital identities from third-party identity providers 203 A-D or self-issued digital identity providers 203 S and may involve the transfer and parsing of security tokens that has been discussed previously in conjunction with act 303.
- the digital identity may be used to obtain data from various different sources, as illustrated in act 503. This is further illustrated in Figure 5 by three boxes 511, 512 & 513 which are contained within the box that represents act 503. Thus, the performance of act 503 may consist of any one or more of the acts described depicted in 511, 512 & 513 and described below.
- data may be obtained directly from information contained within or represented by the digital identity.
- the user may be accessing the website 210 to register a new account, and the website may be requesting information about the user in order to register the new account.
- Techniques for obtaining data from a digital identity may be similar to those described above, for example, with respect to act 303 of Figure 3.
- act 512 illustrated in act 512, wherein the website 210 is asking the user to supply a new username and password, the digital identity may be used to generate a new and unique username and password pair, using a similar process as that discussed previously in conjunction with method 400. This act 512 may occur as an alternative or in addition to acts 511 and/or 513.
- the digital identity may be used to retrieve a previously generated username and password pair and to supply this generated pair to the website 210 in order to authenticate the user 230.
- the data is used to populate one or more of the form fields 213 of the form 212 that were specified in the form field specification 214.
- the populated form fields are automatically submitted, as illustrated in act 505. Acts 504 and 505 have close analogues in acts 304 and 305 of method 300, and the descriptions provided in conjunction with Figure 3 may be applicable.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2011522116A JP5651112B2 (ja) | 2008-08-08 | 2009-07-28 | デジタルidを用いたフォーム入力および自動パスワード生成 |
| EP09805369.7A EP2332114B1 (en) | 2008-08-08 | 2009-07-28 | Form filling with digital identities, and automatic password generation |
| CN200980130775.8A CN102132304B (zh) | 2008-08-08 | 2009-07-28 | 利用数字身份的表单填充以及自动口令生成 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/188,971 | 2008-08-08 | ||
| US12/188,971 US8910256B2 (en) | 2008-08-08 | 2008-08-08 | Form filling with digital identities, and automatic password generation |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2010017066A2 true WO2010017066A2 (en) | 2010-02-11 |
| WO2010017066A3 WO2010017066A3 (en) | 2010-04-22 |
Family
ID=41654166
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2009/051996 Ceased WO2010017066A2 (en) | 2008-08-08 | 2009-07-28 | Form filling with digital identities, and automatic password generation |
Country Status (5)
| Country | Link |
|---|---|
| US (2) | US8910256B2 (enExample) |
| EP (1) | EP2332114B1 (enExample) |
| JP (1) | JP5651112B2 (enExample) |
| CN (1) | CN102132304B (enExample) |
| WO (1) | WO2010017066A2 (enExample) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11089003B2 (en) | 2015-12-16 | 2021-08-10 | Capital One Services, Llc | Browser extension for limited-use secure token payment |
Families Citing this family (68)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101048898B (zh) * | 2004-10-29 | 2012-02-01 | 麦德托尼克公司 | 锂离子电池及医疗装置 |
| US20080201338A1 (en) * | 2007-02-16 | 2008-08-21 | Microsoft Corporation | Rest for entities |
| US20090077627A1 (en) * | 2007-03-16 | 2009-03-19 | Novell, Inc. | Information card federation point tracking and management |
| US20090077655A1 (en) * | 2007-09-19 | 2009-03-19 | Novell, Inc. | Processing html extensions to enable support of information cards by a relying party |
| US20090204622A1 (en) * | 2008-02-11 | 2009-08-13 | Novell, Inc. | Visual and non-visual cues for conveying state of information cards, electronic wallets, and keyrings |
| US8151324B2 (en) | 2007-03-16 | 2012-04-03 | Lloyd Leon Burch | Remotable information cards |
| US8479254B2 (en) * | 2007-03-16 | 2013-07-02 | Apple Inc. | Credential categorization |
| US20090077118A1 (en) * | 2007-03-16 | 2009-03-19 | Novell, Inc. | Information card federation point tracking and management |
| US20090178112A1 (en) * | 2007-03-16 | 2009-07-09 | Novell, Inc. | Level of service descriptors |
| US20090199284A1 (en) * | 2008-02-06 | 2009-08-06 | Novell, Inc. | Methods for setting and changing the user credential in information cards |
| US20090210400A1 (en) * | 2008-02-15 | 2009-08-20 | Microsoft Corporation | Translating Identifier in Request into Data Structure |
| US20090217368A1 (en) * | 2008-02-27 | 2009-08-27 | Novell, Inc. | System and method for secure account reset utilizing information cards |
| US8079069B2 (en) | 2008-03-24 | 2011-12-13 | Oracle International Corporation | Cardspace history validator |
| US20090272797A1 (en) * | 2008-04-30 | 2009-11-05 | Novell, Inc. A Delaware Corporation | Dynamic information card rendering |
| US9953313B2 (en) | 2008-05-09 | 2018-04-24 | Verient, Inc. | System and method for distributed payment products |
| US11080678B2 (en) | 2008-05-09 | 2021-08-03 | Verient, Inc. | Payment processing platform |
| US20100011409A1 (en) * | 2008-07-09 | 2010-01-14 | Novell, Inc. | Non-interactive information card token generation |
| US20100031328A1 (en) * | 2008-07-31 | 2010-02-04 | Novell, Inc. | Site-specific credential generation using information cards |
| US8910256B2 (en) | 2008-08-08 | 2014-12-09 | Microsoft Corporation | Form filling with digital identities, and automatic password generation |
| US20100095372A1 (en) * | 2008-10-09 | 2010-04-15 | Novell, Inc. | Trusted relying party proxy for information card tokens |
| US8083135B2 (en) | 2009-01-12 | 2011-12-27 | Novell, Inc. | Information card overlay |
| US8632003B2 (en) * | 2009-01-27 | 2014-01-21 | Novell, Inc. | Multiple persona information cards |
| US20100251353A1 (en) * | 2009-03-25 | 2010-09-30 | Novell, Inc. | User-authorized information card delegation |
| US8078870B2 (en) * | 2009-05-14 | 2011-12-13 | Microsoft Corporation | HTTP-based authentication |
| US8776214B1 (en) | 2009-08-12 | 2014-07-08 | Amazon Technologies, Inc. | Authentication manager |
| US9373141B1 (en) | 2009-09-23 | 2016-06-21 | Verient, Inc. | System and method for automatically filling webpage fields |
| US8825745B2 (en) | 2010-07-11 | 2014-09-02 | Microsoft Corporation | URL-facilitated access to spreadsheet elements |
| US20120117569A1 (en) * | 2010-11-08 | 2012-05-10 | Kwift SAS | Task automation for unformatted tasks determined by user interface presentation formats |
| US8789154B2 (en) * | 2011-06-30 | 2014-07-22 | Qualcomm Incorporated | Anti-shoulder surfing authentication method |
| US11444936B2 (en) | 2011-07-29 | 2022-09-13 | Amazon Technologies, Inc. | Managing security credentials |
| US10362019B2 (en) | 2011-07-29 | 2019-07-23 | Amazon Technologies, Inc. | Managing security credentials |
| US9767262B1 (en) | 2011-07-29 | 2017-09-19 | Amazon Technologies, Inc. | Managing security credentials |
| CN102916933A (zh) * | 2011-08-03 | 2013-02-06 | 腾讯科技(深圳)有限公司 | 通过第三方网站进行注册或登陆的方法和系统 |
| US8863250B2 (en) | 2012-02-01 | 2014-10-14 | Amazon Technologies, Inc. | Logout from multiple network sites |
| US8955065B2 (en) | 2012-02-01 | 2015-02-10 | Amazon Technologies, Inc. | Recovery of managed security credentials |
| WO2013150492A1 (en) * | 2012-04-05 | 2013-10-10 | Thakker Mitesh L | Systems and methods to input or access data using remote submitting mechanism |
| CN104717227B (zh) * | 2012-06-29 | 2018-10-09 | 北京奇虎科技有限公司 | 一种登录控件更新登录信息的方法和装置 |
| CN103581212B (zh) * | 2012-07-18 | 2017-03-15 | 百度在线网络技术(北京)有限公司 | 基于云端分析的表单自动填充方法、系统及装置 |
| WO2014019129A1 (en) * | 2012-07-31 | 2014-02-06 | Google Inc. | Automating password maintenance |
| US9130932B2 (en) * | 2012-08-13 | 2015-09-08 | Cellco Partnership | Hybrid network application architecture |
| US9282098B1 (en) | 2013-03-11 | 2016-03-08 | Amazon Technologies, Inc. | Proxy server-based network site account management |
| US9565181B2 (en) * | 2013-03-28 | 2017-02-07 | Wendell D. Brown | Method and apparatus for automated password entry |
| KR101498670B1 (ko) * | 2013-10-07 | 2015-03-05 | 이화여자대학교 산학협력단 | 생체정보 기반 신뢰구간집합을 이용한 패스워드 생성 방법 및 장치 |
| US10475018B1 (en) | 2013-11-29 | 2019-11-12 | Amazon Technologies, Inc. | Updating account data for multiple account providers |
| CN104038411B (zh) * | 2014-06-24 | 2017-09-05 | 广州猎豹网络科技有限公司 | 一种生成用户名的方法及系统 |
| CN110351121B (zh) | 2014-10-13 | 2022-10-28 | 柏思科技有限公司 | 用于配置电子装置的方法和系统 |
| CN106156133B (zh) * | 2015-04-09 | 2019-08-20 | 阿里巴巴集团控股有限公司 | 控制表单重复提交的方法、装置及系统 |
| US10042998B2 (en) * | 2015-06-04 | 2018-08-07 | International Business Machines Corporation | Automatically altering and encrypting passwords in systems |
| US11062083B1 (en) * | 2015-12-09 | 2021-07-13 | Amazon Technologies, Inc. | Automated data entry optimization by recognizing invalid data |
| CN108292997B (zh) * | 2015-12-18 | 2021-07-09 | 日本电信电话株式会社 | 认证控制系统及方法、服务器装置、客户装置、认证方法及记录介质 |
| US10051544B2 (en) | 2015-12-23 | 2018-08-14 | Pismo Labs Technology Limited | Methods and systems for selecting SIM card |
| US10411879B2 (en) | 2016-03-25 | 2019-09-10 | Synergex Group | Methods, systems, and media for using dynamic public key infrastructure to send and receive encrypted messages |
| US20170373992A1 (en) * | 2016-06-22 | 2017-12-28 | Clickatell Corporation | Digital interaction process automation |
| US9992022B1 (en) | 2017-02-06 | 2018-06-05 | Northern Trust Corporation | Systems and methods for digital identity management and permission controls within distributed network nodes |
| GB2563742A (en) * | 2017-02-06 | 2018-12-26 | Northern Trust Corp | Systems and methods for digital identity management and permission controls within distributed network nodes |
| US10693644B2 (en) * | 2017-06-23 | 2020-06-23 | International Business Machines Corporation | Single-input multifactor authentication |
| CN107332837A (zh) * | 2017-06-28 | 2017-11-07 | 青岛科技大学 | 一种基于页面地址的口令生成及填充方法 |
| US9990504B1 (en) | 2017-12-18 | 2018-06-05 | Northern Trust Corporation | Systems and methods for generating and maintaining immutable digital meeting records within distributed network nodes |
| US11025614B2 (en) | 2018-10-17 | 2021-06-01 | Synergex Group | Systems, methods, and media for managing user credentials |
| US11546296B2 (en) * | 2018-10-18 | 2023-01-03 | Bank Of America Corporation | Cloud computing architecture with secure multi-cloud integration |
| US11122029B2 (en) * | 2019-01-11 | 2021-09-14 | Citrix Systems, Inc. | Secure cloud computing |
| SG10201906806XA (en) * | 2019-07-23 | 2021-02-25 | Mastercard International Inc | Methods and computing devices for auto-submission of user authentication credential |
| US11271752B2 (en) * | 2019-07-29 | 2022-03-08 | International Business Machines Corporation | Automatic form completion from a set of federated data providers |
| CN113141251B (zh) * | 2020-01-20 | 2024-05-21 | 北京京东振世信息技术有限公司 | 一种登录网站的方法和装置 |
| US11574298B2 (en) | 2020-08-18 | 2023-02-07 | Paypal, Inc. | Systems and methods for configuration information autofill at a browser linked with user accounts |
| CN113569274A (zh) * | 2021-06-07 | 2021-10-29 | 飞友科技有限公司 | 一种免注册登录的表单填写方法及装置 |
| US12341903B2 (en) * | 2022-08-12 | 2025-06-24 | Adobe Inc. | Filling digital documents using multi-tiered user identity models based on decentralized identity |
| LU103094B1 (de) | 2023-03-29 | 2024-09-30 | Heylogin Gmbh | Innovatives serverbasiertes verfahren zum management geheimer daten |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050177731A1 (en) | 2004-02-09 | 2005-08-11 | International Business Machines Corporation | Secure management of authentication information |
Family Cites Families (40)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5017A (en) * | 1847-03-13 | 1847-03-13 | Self-adjusting- pendulum | |
| US6006333A (en) * | 1996-03-13 | 1999-12-21 | Sun Microsystems, Inc. | Password helper using a client-side master password which automatically presents the appropriate server-side password to a particular remote server |
| JPH10248056A (ja) * | 1997-03-04 | 1998-09-14 | Sony Corp | 番組データ送出確認装置 |
| US6000033A (en) * | 1997-11-26 | 1999-12-07 | International Business Machines Corporation | Password control via the web |
| JP3430896B2 (ja) * | 1998-01-13 | 2003-07-28 | 日本電気株式会社 | パスワード更新装置及び記録媒体 |
| US6192380B1 (en) * | 1998-03-31 | 2001-02-20 | Intel Corporation | Automatic web based form fill-in |
| US6910179B1 (en) * | 1998-11-10 | 2005-06-21 | Clarita Corporation | Method and apparatus for automatic form filling |
| US6490601B1 (en) * | 1999-01-15 | 2002-12-03 | Infospace, Inc. | Server for enabling the automatic insertion of data into electronic forms on a user computer |
| US6629246B1 (en) * | 1999-04-28 | 2003-09-30 | Sun Microsystems, Inc. | Single sign-on for a network system that includes multiple separately-controlled restricted access resources |
| US20020023108A1 (en) * | 1999-09-09 | 2002-02-21 | Neil Daswani | Automatic web form interaction proxy |
| US6826700B1 (en) * | 1999-11-24 | 2004-11-30 | Unisys Corporation | Method and apparatus for a web application server to automatically solicit a new password when an existing password has expired |
| WO2001048674A1 (en) | 1999-12-24 | 2001-07-05 | Link Plus, Inc. | Method and system for authenticating identity on internet |
| AU2001230933A1 (en) | 2000-01-14 | 2001-07-24 | Catavault | Method and system for secure personal authentication credentials data over a network |
| TW550477B (en) | 2000-03-01 | 2003-09-01 | Passgate Corp | Method, system and computer readable medium for Web site account and e-commerce management from a central location |
| US7363248B2 (en) * | 2000-12-22 | 2008-04-22 | Invenda Corporation | Pre-filling order forms for transactions over a communications network |
| WO2002073926A1 (en) * | 2001-03-09 | 2002-09-19 | Ascio Technologies, Inc. | System and a method for managing digital identities |
| KR100494628B1 (ko) | 2001-04-14 | 2005-06-13 | 크로스반도체기술 주식회사 | 웹사이트 자동접속 장치 및 방법 |
| US7103912B2 (en) * | 2001-06-29 | 2006-09-05 | International Business Machines Corporation | User authorization management system using a meta-password and method for same |
| US20030041251A1 (en) * | 2001-08-23 | 2003-02-27 | International Business Machines Corporation | Rule-compliant password generator |
| JP2003186734A (ja) * | 2001-12-21 | 2003-07-04 | Dainippon Printing Co Ltd | 電子フォームデータコンバートシステム、サーバ、開発クライアント、プログラム、記録媒体 |
| TW586714U (en) * | 2002-08-22 | 2004-05-01 | Handlink Technologies Inc | Automatic account generating device and the printer thereof |
| US7822988B2 (en) | 2003-10-23 | 2010-10-26 | Microsoft Corporation | Method and system for identity recognition |
| US20050198212A1 (en) * | 2003-12-16 | 2005-09-08 | Alex Zilberfayn | Interactive forms processing system and method |
| US20050183003A1 (en) * | 2004-02-17 | 2005-08-18 | Checkpoint Software Technologies Ltd. | Automatic proxy form filing |
| JP2005301500A (ja) * | 2004-04-08 | 2005-10-27 | Fujitsu Ltd | 情報処理装置 |
| JP2006011894A (ja) | 2004-06-28 | 2006-01-12 | Fujitsu Ltd | Id・パスワード自動作成プログラムおよびid・パスワード自動作成システム |
| US8839090B2 (en) * | 2004-09-16 | 2014-09-16 | International Business Machines Corporation | System and method to capture and manage input values for automatic form fill |
| US7797413B2 (en) | 2004-10-29 | 2010-09-14 | The Go Daddy Group, Inc. | Digital identity registration |
| US20060168509A1 (en) * | 2005-01-27 | 2006-07-27 | International Business Machines Corporation | System and method to map favorite values for specific values during electronic form filling |
| WO2007047695A2 (en) | 2005-10-17 | 2007-04-26 | Markmonitor Inc. | B2c authentication |
| US8117459B2 (en) | 2006-02-24 | 2012-02-14 | Microsoft Corporation | Personal identification information schemas |
| US20070226783A1 (en) * | 2006-03-16 | 2007-09-27 | Rabbit's Foot Security, Inc. (A California Corporation) | User-administered single sign-on with automatic password management for web server authentication |
| US7739744B2 (en) * | 2006-03-31 | 2010-06-15 | Novell, Inc. | Methods and systems for multifactor authentication |
| US20080071808A1 (en) | 2006-09-14 | 2008-03-20 | Sxip Identity Corporation | Internet Identity Manager |
| US7870597B2 (en) * | 2007-04-10 | 2011-01-11 | Symantec Corporation | Method and apparatus for managing digital identities through a single interface |
| GB2449510A (en) * | 2007-05-24 | 2008-11-26 | Asim Bucuk | A method and system for the creation, management and authentication of links between people, entities, objects and devices |
| US20090300097A1 (en) * | 2008-05-29 | 2009-12-03 | Ebay Inc. | Systems and methods for facilitating clientless form-filling over a network |
| US20100017889A1 (en) * | 2008-07-17 | 2010-01-21 | Symantec Corporation | Control of Website Usage Via Online Storage of Restricted Authentication Credentials |
| US20100031328A1 (en) * | 2008-07-31 | 2010-02-04 | Novell, Inc. | Site-specific credential generation using information cards |
| US8910256B2 (en) | 2008-08-08 | 2014-12-09 | Microsoft Corporation | Form filling with digital identities, and automatic password generation |
-
2008
- 2008-08-08 US US12/188,971 patent/US8910256B2/en active Active
-
2009
- 2009-07-28 WO PCT/US2009/051996 patent/WO2010017066A2/en not_active Ceased
- 2009-07-28 CN CN200980130775.8A patent/CN102132304B/zh active Active
- 2009-07-28 EP EP09805369.7A patent/EP2332114B1/en active Active
- 2009-07-28 JP JP2011522116A patent/JP5651112B2/ja not_active Expired - Fee Related
-
2014
- 2014-12-08 US US14/563,506 patent/US9450954B2/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050177731A1 (en) | 2004-02-09 | 2005-08-11 | International Business Machines Corporation | Secure management of authentication information |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11089003B2 (en) | 2015-12-16 | 2021-08-10 | Capital One Services, Llc | Browser extension for limited-use secure token payment |
| US11677737B2 (en) | 2015-12-16 | 2023-06-13 | Capital One Services Llc | Browser extension for limited-use secure token payment |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2010017066A3 (en) | 2010-04-22 |
| US8910256B2 (en) | 2014-12-09 |
| JP5651112B2 (ja) | 2015-01-07 |
| EP2332114A2 (en) | 2011-06-15 |
| US9450954B2 (en) | 2016-09-20 |
| CN102132304B (zh) | 2015-04-22 |
| US20150096000A1 (en) | 2015-04-02 |
| CN102132304A (zh) | 2011-07-20 |
| EP2332114B1 (en) | 2018-08-22 |
| JP2011530740A (ja) | 2011-12-22 |
| EP2332114A4 (en) | 2014-09-03 |
| US20100037303A1 (en) | 2010-02-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2332114B1 (en) | Form filling with digital identities, and automatic password generation | |
| US20230370464A1 (en) | Systems and methods for controlling sign-on to web applications | |
| US9300653B1 (en) | Delivery of authentication information to a RESTful service using token validation scheme | |
| EP2936768B1 (en) | A system and method of dynamic issuance of privacy preserving credentials | |
| US9172541B2 (en) | System and method for pool-based identity generation and use for service access | |
| US8973123B2 (en) | Multifactor authentication | |
| EP3610623B1 (en) | Protocol-level identity mapping | |
| US10069812B1 (en) | Technique for facilitating auto login to a website | |
| EP3334505B1 (en) | Method and device for managing resources with an external account | |
| US9923990B2 (en) | User information widgets and methods for updating and retrieving user information | |
| EP2669837B1 (en) | Cooperation system, cooperation method threreof, information processing system, and program thereof | |
| CN107690792A (zh) | 未经管理的移动设备的单点登录 | |
| Bihis | Mastering OAuth 2.0 | |
| US20100095372A1 (en) | Trusted relying party proxy for information card tokens | |
| EP2040190A2 (en) | Processing HTML extensions to enable support of information cards by relying party | |
| CN116484338A (zh) | 数据库访问方法及装置 | |
| US8543810B1 (en) | Deployment tool and method for managing security lifecycle of a federated web service | |
| Hasan et al. | Please permit me: Stateless delegated authorization in mashups | |
| Shah | Hacking Web Services | |
| US10423776B1 (en) | Systems and methods for password-based authentication | |
| US20100005521A1 (en) | Method of Securing Password in Web Page and Computer-Readable Recording Medium Storing Program for Executing the Same | |
| CN120034367A (zh) | 基于Oauth授权框架的统一认证方法及计算机设备 | |
| Chadwick et al. | CardSpace in the Cloud | |
| US7734642B2 (en) | Method and system for automating purpose usage selection on web sites | |
| HK1233788B (zh) | 一种采用外部账户操作资源的方法和装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 200980130775.8 Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09805369 Country of ref document: EP Kind code of ref document: A2 |
|
| ENP | Entry into the national phase |
Ref document number: 2011522116 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2009805369 Country of ref document: EP |