WO2022090793A1 - System and method for validation of authenticity of an authorized user - Google Patents

System and method for validation of authenticity of an authorized user Download PDF

Info

Publication number
WO2022090793A1
WO2022090793A1 PCT/IB2020/062010 IB2020062010W WO2022090793A1 WO 2022090793 A1 WO2022090793 A1 WO 2022090793A1 IB 2020062010 W IB2020062010 W IB 2020062010W WO 2022090793 A1 WO2022090793 A1 WO 2022090793A1
Authority
WO
WIPO (PCT)
Prior art keywords
subsystem
status
digital identifier
validation
identifier
Prior art date
Application number
PCT/IB2020/062010
Other languages
French (fr)
Inventor
Kulothungaboopathy Vijayarangam
Original Assignee
Kulothungaboopathy Vijayarangam
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kulothungaboopathy Vijayarangam filed Critical Kulothungaboopathy Vijayarangam
Publication of WO2022090793A1 publication Critical patent/WO2022090793A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Definitions

  • Embodiments of a present invention relate to validating authenticity of users, and more particularly, to a system and method for validation of the authenticity of an authorized user.
  • a plurality of operations can be executed via an online platform easing the life of human beings. Further, to secure such operations, people usually need to use a login identifier (ID) and a password to login on the online platform to perform the corresponding operation.
  • ID login identifier
  • the login ID and the password are supposed to be kept secret to prevent any kind of misuse of the corresponding account of the people.
  • a system for validation of authenticity of an authorized user includes one or more processors.
  • the system also includes a domain linking subsystem operable by the one or more processors.
  • the domain linking subsystem is configured to link a domain associated with at least one of a plurality of platforms with a centralized platform, wherein the authorized user is registered on at least one of the plurality of platforms via a digital identifier.
  • the system also includes a credential verification subsystem operable by the one or more processors.
  • the credential verification subsystem is configured to fetch a unique identifier linked to a user device upon linking the domain with the centralized platform, wherein the user device is associated with the authorized user.
  • the credential verification subsystem is also configured to check for presence of the digital identifier linked to the corresponding unique identifier in a database to generate a verification result, wherein the database is associated with the corresponding domain.
  • the system also includes a digital identifier linking subsystem operable by the one or more processors.
  • the digital identifier linking subsystem is configured to retrieve the digital identifier from the corresponding database upon generation of a positive verification result by the credential verification subsystem.
  • the digital identifier linking subsystem is also configured to link the digital identifier retrieved with the centralized platform.
  • the system also includes a status control subsystem operable by the one or more processors.
  • the status control subsystem is configured to set a status of the digital identifier linked to the centralized platform to a sleep mode upon linking.
  • the status control subsystem is also configured to enable the authorized user to alter the status of the digital identifier linked to an awake mode for a pre-defined time interval.
  • the system also includes a validation subsystem operable by the one or more processors.
  • the validation subsystem is configured to receive the digital identifier when the authorized user is making a login on at least one of the plurality of platforms.
  • the validation subsystem is also configured to detect the status of the corresponding digital identifier on the centralized platform to generate a validation result.
  • the status control subsystem is configured to set the status to the sleep mode automatically upon one of completion of the pre-defined time interval, or completion of detecting the status by the validation subsystem.
  • a method for validation of authenticity of an authorized user is provided.
  • the method includes linking the domain associated with at least one of a plurality of platforms with a centralized platform, wherein the authorized user is registered on at least one of the plurality of platforms via a digital identifier.
  • the method also includes fetching a unique identifier linked to a user device upon linking the domain with the centralized platform, wherein the user device is associated with the authorized user.
  • the method also includes checking for a presence of the digital identifier linked to the corresponding unique identifier in a database to generate a verification result, wherein the database is associated with the corresponding domain.
  • the method also includes retrieving the digital identifier from the corresponding database upon generation of a positive verification result by the credential verification subsystem.
  • the method also includes linking the digital identifier retrieved with the centralized platform.
  • the method also includes setting a status of the digital identifier linked to the centralized platform to a sleep mode upon linking.
  • the method also includes enabling the authorized user to alter the status of the digital identifier linked to an awake mode for a pre-defined time interval.
  • the method also includes receiving the digital identifier when the authorized user is making a login on at least one of the plurality of platforms.
  • the method also includes detecting the status of the corresponding digital identifier on the centralized platform for generating a validation result.
  • the method also includes setting the status to the sleep mode automatically upon one of completion of the pre-defined time interval, or completion of detecting the status by the validation subsystem.
  • FIG. 1 is a block diagram representation of a system for validation of authenticity of an authorized user in accordance with an embodiment of the present disclosure
  • FIG. 2 is a block diagram representation of an exemplary embodiment of the system for validation of the authenticity of the authorized user of FIG. 1 in accordance with an embodiment of the present disclosure
  • FIG. 3 is a block diagram of a validation computer or a validation server in accordance with an embodiment of the present disclosure.
  • FIG. 4 is a flow chart representing steps involved in a method for validation of authenticity of an authorized user in accordance with an embodiment of the present disclosure.
  • Embodiments of the present disclosure relate to a system for validation of authenticity of an authorized user.
  • the authorized user uses a digital identifier and a password to log in on a plurality of platforms for security purposes and perform a plurality of operations on the corresponding plurality of platforms. If a fraudster gets access to the digital identifier and the password which belongs to the authorized user, then the fraudster can misuse the account of the authorized user for self-benefit. However, if the digital identifier of the authorized user is kept in sleep mode, then even if the fraudster gets access to the corresponding digital identifier and the password, the fraudster cannot log in.
  • the system as described hereafter in FIG. 1 is the system for validation of the authenticity of the authorized user by enabling the authorized user to change a status of the digital identifier to an awake mode only when there is a need and for the rest of the time, the digital identifier remains in the sleep mode.
  • FIG. 1 is a block diagram representation of a system (10) for validation of authenticity of an authorized user in accordance with an embodiment of the present disclosure.
  • the authorized user may use a digital identifier to log in on a plurality of platforms.
  • the authorized user needs to link the digital identifier of the authorized user to a centralized platform for the authorized user to prevent a fraudster from misusing the digital identifier.
  • the term “digital identifier” is defined as a user identifier commonly used to log on to a website, an application, an online service, or the like.
  • the digital identifier includes an authorized user identifier including one of an authorized user name, a contact number, an e-mail identifier, a social media identifier, a transactional identifier, and the like.
  • the social media identifier includes a social networking identifier, a microblogging identifier, a visual media sharing identifier, and the like.
  • the term “transactional identifier” is defined as an identifier used by a user to perform one or more monetary transactions.
  • the system (10) herein represents the centralized platform, wherein the system (10) includes one or more processors (20).
  • the system (10) also includes a domain linking subsystem (30) operable by the one or more processors (20).
  • the domain linking subsystem (30) links the domain associated with at least one of the plurality of platforms with the centralized platform, wherein the authorized user is registered on at least one of the plurality of platforms via the digital identifier.
  • the term “domain” in computing is defined as a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular organization or individual.
  • the domain associated with at least one of the plurality of platforms includes one of a social media domain, an E- commerce domain, a transaction-related domain, or the like.
  • the plurality of platforms includes a plurality of online platforms.
  • the system (10) includes a credential verification subsystem (50) operable by the one or more processors (20).
  • the credential verification subsystem (50) is operatively coupled to the domain linking subsystem (30).
  • the credential verification subsystem (50) fetches a unique identifier linked to a user device (55) upon linking the domain with the centralized platform, wherein the user device (55) is associated with the authorized user.
  • the unique identifier fetched includes a contact number of the authorized user, or any identifier associated with the user device (55) wherein the unique identifier is housed within the user device (55).
  • the user device (55) includes a mobile phone, a laptop, a tablet, a desktop computer, or the like.
  • the unique identifier fetched includes one of a contact number, International Mobile Equipment Identity (IMEI) number, and the like.
  • IMEI International Mobile Equipment Identity
  • a unique device identifier is used as the unique identifier when the user device includes the desktop computer.
  • the unique device identifier may include a hardware identifier, a machine identifier, a universally unique identifier, or the like.
  • the credential verification subsystem (50) also checks for presence of the digital identifier linked to the corresponding unique identifier in a database (as shown in FIG. 2) to generate a verification result, wherein the database is associated with the corresponding domain.
  • the verification result includes one of a positive verification result and a negative verification result.
  • the credential verification subsystem (50) generates the positive verification result when the digital identifier linked to the corresponding unique identifier is present in the database. In another embodiment, the credential verification subsystem (50) generates the negative verification result when there is no digital identifier found linked to the corresponding unique identifier in the database.
  • the system (10) includes a digital identifier linking subsystem (60) operable by the one or more processors (20).
  • the digital identifier linking subsystem (60) is operatively coupled to the credential verification subsystem (50).
  • the digital identifier linking subsystem (60) retrieves the digital identifier from the corresponding database upon generation of the positive verification result by the credential verification subsystem (50).
  • the digital identifier linking subsystem (60) also links the digital identifier retrieved with the centralized platform.
  • the system (10) also includes a status control subsystem (70) operable by the one or more processors (20).
  • the status control subsystem (70) is operatively coupled to the digital identifier linking subsystem (60).
  • the status control subsystem (70) sets a status of the digital identifier linked to the centralized platform to a sleep mode upon linking. In one embodiment, setting the status of the digital identifier which is been verified on the centralized platform to the sleep mode prevents misusage of the corresponding digital identifier by a user who is a fraudster.
  • the status control subsystem (70) also enables the authorized user to alter the status of the digital identifier linked to an awake mode for a pre-defined time interval.
  • the pre-defined time interval includes a very short time interval ranging from about a few microseconds to about a few seconds.
  • the digital identifier may be used by the authorized user to log in on the plurality of platforms.
  • the authenticity of the authorized user who is entering the corresponding digital identifier needs to be validated.
  • the status of the digital identifier on the centralized platform may have to be checked to validate the authenticity of the authorized user.
  • the system (10) includes a validation subsystem (80) operable by the one or more processors (20).
  • the validation subsystem (80) is operatively coupled to the status control subsystem (70).
  • the validation subsystem (80) receives the digital identifier when the authorized user is making the login on at least one of the plurality of platforms.
  • the validation subsystem (80) also detects the status of the corresponding digital identifier on the centralized platform to generate a validation result.
  • the validation result includes an approval to proceed and login on the corresponding at least one of the plurality of platforms when the status of the digital identifier as detected by the validation subsystem (80) is in the awake mode.
  • the validation result includes a rejection to proceed and login on the corresponding at least one of the plurality of platforms when the status of the digital identifier as detected by the validation subsystem (80) is in the sleep mode.
  • the validation subsystem (80) generates a notification for the authorized user upon generation of the validation result by the validation subsystem (80), wherein the validation result includes the rejection to proceed and login on the corresponding at least one of the plurality of platforms.
  • the notification is sent to the authorized user via a text message, an e-mail, a pop-up on the centralized platform, and the like.
  • the authorized user uses the digital identifier to perform a plurality of operations upon altering the status of the digital identifier on the centralized platform to the awake mode.
  • the plurality of operations includes booking items for purchasing, exchanging information, making payments, and the like.
  • the status control subsystem (70) also sets the status to the sleep mode automatically upon one of a completion of the pre-defined time interval or the completion of detecting the status by the validation subsystem (80).
  • FIG. 2 is a block diagram representation of an exemplary embodiment of the system (10) for validation of the authenticity of the authorized user of FIG. 1 in accordance with an embodiment of the present disclosure.
  • the system (10) herein represents the centralized platform, wherein the system (10) includes the one or more processors (20).
  • a person ‘x’ (90) is working in a company (100) named ‘abc’.
  • the person ‘x’ (90) needs to log in on a company’s platform via a login identifier (ID) which is ‘x@abc.com’ to work in that particular company (100).
  • ID login identifier
  • the person ‘x’ (90) needs to link the login ID with the centralized platform to prevent the misuse of the corresponding login ID by any fraudster.
  • a domain associated with the company’s platform needs to be linked with the centralized platform.
  • the domain linking subsystem (30) of the system (10) links the domain associated with the company’s platform with the centralized platform, wherein the domain includes ‘abc.com’. Further, the domain is associated with the database (120), wherein one or more credentials of the person ‘x’ (90) are pre-stored in the database (120). Also, the person ‘x’ (90) is registered on the company’s platform via the corresponding login ID.
  • the person ‘x’ (90) wants to link the login ID with the centralized platform and hence trues to get access to the centralized platform via a mobile phone (125).
  • the credential verification subsystem (50) of the system (10) fetches a contact number linked to the mobile phone (125) upon linking the domain with the centralized platform, wherein the mobile phone (125) belongs to the person ‘x’ (90).
  • the credential verification subsystem (50) checks for the presence of the login ID linked to the corresponding contact number in the database (120) to generate the verification result. Further, the login ID is supposed to be retrieved from the database (120) in order to link the login ID with the centralized platform.
  • the digital identifier linking subsystem (60) of the system (10) retrieves the login ID from the database (120) upon generation of the positive verification result by the credential verification subsystem (50). Later, the digital identifier linking subsystem (60) links the login ID retrieved with the centralized platform.
  • the status control subsystem (70) of the system (10) sets the status of the login ID to the sleep mode upon linking. Also, the status control subsystem (70) enables the person ‘x’ (90) to alter the status of the login ID linked to an awake mode for the pre-defined time interval.
  • the validation subsystem (80) of the system (10) receives the login ID, when the person ‘x’ (90) tries to log in to the company’s platform by entering the login ID and the password. Further, the validation subsystem (80) detects the status of the corresponding login ID on the centralized platform to generate the validation result. Further, for the person ‘x’ (90) to receive the validation result including the approval to proceed, the person ‘x’ (90) needs to alter the status of the login ID to the awake mode.
  • the validation subsystem (80) generates the validation result which includes the rejection to proceed and the person ‘x’ (90) receives the notification when the status of the login ID is in the sleep mode.
  • the person ‘x’ (90) can alter the status on the centralized platform to the awake mode and then proceed with the login process.
  • the fraudster is trying to login to the company’s platform, then since the person ‘x’ (90) gets the notification of such fraudulent activity, can stay alert and take preventive measures to prevent such fraudulent activity to happen in the future.
  • the status control subsystem (70) sets the status to the sleep mode automatically upon one of the completion of the pre-defined time interval or the completion of detecting the status by the validation subsystem (80).
  • FIG. 3 is a block diagram of a validation computer or a validation server (140) in accordance with an embodiment of the present disclosure.
  • the validation server (140) includes processor(s) (150), and a memory (160) coupled to a bus (170).
  • the processor(s) (150) and the memory (160) are substantially similar to the system (10) of FIG. 1.
  • the memory (160) is located in a local storage device.
  • the processor(s) (150), as used herein, means any type of computational circuit, such as but not limited to, a microprocessor, a microcontroller, a complex instruction set computing microprocessor, a reduced instruction set computing microprocessor, a very long instruction word microprocessor, an explicitly parallel instruction computing microprocessor, a digital signal processor, or any other type of processing circuit, or a combination thereof.
  • Computer memory elements may include any suitable memory device(s) for storing data and executable program, such as read only memory, random access memory, erasable programmable read only memory, electrically erasable programmable read only memory, hard drive, removable media drive for handling memory cards and the like.
  • Embodiments of the present subject matter may be implemented in conjunction with program modules, including functions, procedures, data structures, and application programs, for performing tasks, or defining abstract data types or low-level hardware contexts.
  • Executable program stored on any of the above-mentioned storage media may be executable by the processor(s) (150).
  • the memory (160) includes a plurality of subsystems stored in the form of executable program which instructs the processor(s) (150) to perform method steps illustrated in FIG. 3.
  • the memory (160) has following subsystems: a domain linking subsystem (30), a credential verification subsystem (50), a digital identifier linking subsystem (60), a status control subsystem (70), and a validation subsystem (80).
  • the domain linking subsystem (30) is configured to link a domain associated with at least one of a plurality of platforms with a centralized platform, wherein the authorized user is registered on at least one of the plurality of platforms via a digital identifier.
  • the credential verification subsystem (50) is configured to fetch a unique identifier linked to a user device (55) upon linking the domain with the centralized platform, wherein the user device (55) is associated with the authorized user.
  • the credential verification subsystem (50) is also configured to check for presence of the digital identifier linked to the corresponding unique identifier in a database (120) to generate a verification result, wherein the database (120) is associated with the corresponding domain.
  • the digital identifier linking subsystem (60) is configured to retrieve the digital identifier from the corresponding database (120) upon generation of a positive verification result by the credential verification subsystem (50).
  • the digital identifier linking subsystem (60) is also configured to link the digital identifier retrieved with the centralized platform.
  • the status control subsystem (70) is configured to set a status of the digital identifier linked to the centralized platform to a sleep mode upon linking.
  • the status control subsystem (70) is also configured to enable the authorized user to alter the status of the digital identifier linked to an awake mode for a pre-defined time interval.
  • the validation subsystem (80) is configured to receive the digital identifier when the authorized user is making a login on at least one of the plurality of platforms.
  • the validation subsystem (80) is also configured to detect the status of the corresponding digital identifier on the centralized platform to generate a validation result.
  • the status control subsystem (70) is configured to set the status to the sleep mode automatically upon one of completion of the pre-defined time interval, or completion of detecting the status by the validation subsystem (80).
  • FIG. 4 is a flow chart representing steps involved in a method (180) for validation of authenticity of an authorized user in accordance with an embodiment of the present disclosure.
  • the method (180) includes linking a domain associated with at least one of a plurality of platforms with a centralized platform, wherein the authorized user is registered on at least one of the plurality of platforms via a digital identifier in step 190.
  • linking the domain associated with at least one of the plurality of platforms with the centralized platform includes linking the domain associated with at least one of the plurality of platforms with the centralized platform by a domain linking subsystem (30).
  • the method (180) includes fetching a unique identifier linked to a user device upon linking the domain with the centralized platform, wherein the user device is associated with the authorized user in step 200.
  • fetching the unique identifier linked to the user device includes fetching the unique identifier linked to the user device by a credential verification subsystem (50).
  • the method (180) also includes checking for a presence of the digital identifier linked to the corresponding unique identifier in a database to generate a verification result, wherein the database is associated with the corresponding domain in step 210.
  • checking for the presence of the digital identifier linked to the corresponding unique identifier in the database includes checking for the presence of the digital identifier linked to the corresponding unique identifier in the database by the credential verification subsystem (50).
  • the method (180) also includes retrieving the digital identifier from the corresponding database upon generation of a positive verification result by the credential verification subsystem in step 220.
  • retrieving the digital identifier from the corresponding database includes retrieving the digital identifier from the corresponding database by a digital identifier linking subsystem (60).
  • the method (180) also includes linking the digital identifier retrieved with the centralized platform in step 230.
  • linking the digital identifier retrieved with the centralized platform includes linking the digital identifier retrieved with the centralized platform by the digital identifier linking subsystem (60).
  • the method (180) also includes setting a status of the digital identifier linked to the centralized platform to a sleep mode upon linking in step 240.
  • setting the status of the digital identifier linked to the centralized platform to the sleep mode includes setting the status of the digital identifier linked to the centralized platform to the sleep mode by a status control subsystem (70).
  • the method (180) also includes enabling the authorized user to alter the status of the digital identifier linked to an awake mode for a pre-defined time interval in step 250.
  • enabling the authorized user to alter the status of the digital identifier linked to the awake mode for the pre-defined time interval includes enabling the authonzed user to alter the status of the digital identifier linked to the awake mode for the pre-defined time interval by the status control subsystem (70).
  • the method (180) also includes receiving the digital identifier when the authorized user is making a login on at least one of the plurality of platforms in step 260.
  • receiving the digital identifier includes receiving the digital identifier by a validation subsystem (80).
  • the method (180) also includes detecting the status of the corresponding digital identifier on the centralized platform for generating a validation result in step 270.
  • detecting the status of the corresponding digital identifier on the centralized platform includes detecting the status of the corresponding digital identifier on the centralized platform by the validation subsystem (80).
  • generating the validation result includes generating the validation result including an approval to proceed and login on the corresponding at least one of the plurality of platforms when the status of the digital identifier as detected by the validation subsystem is in the awake mode. In another exemplary embodiment, generating the validation result includes generating the validation result including a rejection to proceed and login on the corresponding at least one of the plurality of platforms when the status of the digital identifier as detected by the validation subsystem is in the sleep mode.
  • the method (180) also includes setting the status to the sleep mode automatically upon one of completion of the pre-defined time interval, or completion of detecting the status by the validation subsystem in step 280.
  • setting the status to the sleep mode automatically includes setting the status to the sleep mode automatically by the status control subsystem (70).
  • Various embodiments of the present disclosure enable the authorized user to prevent any kind of misuse of the digital identifier of the authorized user as the digital identifier remains in the sleep mode all the time.
  • the authorized user can alter the status to the awake mode and use the digital identifier to perform an operation, and after one of completion of the pre-defined time interval, or completion of detecting the status, the status gets updated automatically to the sleep mode.
  • the fraudster from misusing the corresponding digital identifier as the digital identifier remains in sleep mode until the authorized user changes the status to the awake mode.
  • the system is more efficient, more reliable, cost-effective, and the method steps implementation is quick as the system only adds an additional layer of protection to an existing system which performs the corresponding operation.
  • the status can be altered to the awake mode upon a single click by the user via the user device, thereby making the system efficient in terms of time. Further, there is no secret code used to do so which can get leaked.
  • the system eliminates processing of one or more unauthorized transactions which otherwise might have occurred, thereby saving huge cost used for the processing and storing of data associated to such processing in the server and the database.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

A system for validation of authenticity of an authorized user is provided. The system includes a domain linking subsystem which links a domain with a centralized platform. The system also includes a credential verification subsystem which fetches a unique identifier linked to a user device and checks for presence of the digital identifier in a database. The system also includes a digital identifier linking subsystem which retrieves the digital identifier from the database and links with the centralized platform. The system also includes a status control subsystem which sets the status of the digital identifier to a sleep mode and enables the authorized user to alter the status. The system also includes a validation subsystem which receives the digital identifier when the authorized user is making a login and detects the status of the digital identifier. The status control subsystem also sets the status to the sleep mode automatically.

Description

SYSTEM AND METHOD FOR VALIDATION OF AUTHENTICITY OF AN AUTHORIZED USER
This International Application claims priority from a Patent application filed in India having Patent Application No. 202041047792, filed on November 02, 2020, and titled “SYSTEM AND METHOD FOR VALIDATION OF AUTHENTICITY OF AN AUTHORIZED USER”.
FIELD OF INVENTION
Embodiments of a present invention relate to validating authenticity of users, and more particularly, to a system and method for validation of the authenticity of an authorized user.
BACKGROUND
In today’s digital world, a plurality of operations can be executed via an online platform easing the life of human beings. Further, to secure such operations, people usually need to use a login identifier (ID) and a password to login on the online platform to perform the corresponding operation. The login ID and the password are supposed to be kept secret to prevent any kind of misuse of the corresponding account of the people.
However, as the digital world is advancing for the betterment of the society, the world of theft is also advancing, and hence there are possibilities that a fraudster might get access to the login ID and the password of a person without the knowledge of the person. There are multiple approaches to deal with such fraudulent activity. However, such multiple approaches are time-consuming are they include multiple steps to be implemented by the user to prevent any such fraudulent activity. Also, today huge resources are consumed to process such fraudulent activity and to store the massive data of such fraudulent activity in the servers of all players involved in the login process, thereby making such multiple approaches less reliable, less efficient, and time-consuming.
Hence, there is a need for an improved system and method for validation of authenticity of an authorized user which addresses the aforementioned issues. BRIEF DESCRIPTION
In accordance with one embodiment of the disclosure, a system for validation of authenticity of an authorized user is provided. The system includes one or more processors. The system also includes a domain linking subsystem operable by the one or more processors. The domain linking subsystem is configured to link a domain associated with at least one of a plurality of platforms with a centralized platform, wherein the authorized user is registered on at least one of the plurality of platforms via a digital identifier. Further, the system also includes a credential verification subsystem operable by the one or more processors. The credential verification subsystem is configured to fetch a unique identifier linked to a user device upon linking the domain with the centralized platform, wherein the user device is associated with the authorized user. The credential verification subsystem is also configured to check for presence of the digital identifier linked to the corresponding unique identifier in a database to generate a verification result, wherein the database is associated with the corresponding domain. The system also includes a digital identifier linking subsystem operable by the one or more processors. The digital identifier linking subsystem is configured to retrieve the digital identifier from the corresponding database upon generation of a positive verification result by the credential verification subsystem. The digital identifier linking subsystem is also configured to link the digital identifier retrieved with the centralized platform. The system also includes a status control subsystem operable by the one or more processors. The status control subsystem is configured to set a status of the digital identifier linked to the centralized platform to a sleep mode upon linking. The status control subsystem is also configured to enable the authorized user to alter the status of the digital identifier linked to an awake mode for a pre-defined time interval. The system also includes a validation subsystem operable by the one or more processors. The validation subsystem is configured to receive the digital identifier when the authorized user is making a login on at least one of the plurality of platforms. The validation subsystem is also configured to detect the status of the corresponding digital identifier on the centralized platform to generate a validation result. Further, the status control subsystem is configured to set the status to the sleep mode automatically upon one of completion of the pre-defined time interval, or completion of detecting the status by the validation subsystem. In accordance with another embodiment, a method for validation of authenticity of an authorized user is provided. The method includes linking the domain associated with at least one of a plurality of platforms with a centralized platform, wherein the authorized user is registered on at least one of the plurality of platforms via a digital identifier. The method also includes fetching a unique identifier linked to a user device upon linking the domain with the centralized platform, wherein the user device is associated with the authorized user. The method also includes checking for a presence of the digital identifier linked to the corresponding unique identifier in a database to generate a verification result, wherein the database is associated with the corresponding domain. The method also includes retrieving the digital identifier from the corresponding database upon generation of a positive verification result by the credential verification subsystem. The method also includes linking the digital identifier retrieved with the centralized platform. The method also includes setting a status of the digital identifier linked to the centralized platform to a sleep mode upon linking. The method also includes enabling the authorized user to alter the status of the digital identifier linked to an awake mode for a pre-defined time interval. The method also includes receiving the digital identifier when the authorized user is making a login on at least one of the plurality of platforms. The method also includes detecting the status of the corresponding digital identifier on the centralized platform for generating a validation result. The method also includes setting the status to the sleep mode automatically upon one of completion of the pre-defined time interval, or completion of detecting the status by the validation subsystem.
To further clarify the advantages and features of the present disclosure, a more particular description of the disclosure will follow by reference to specific embodiments thereof, which are illustrated in the appended figures. It is to be appreciated that these figures depict only typical embodiments of the disclosure and are therefore not to be considered limiting in scope. The disclosure will be described and explained with additional specificity and detail with the appended figures.
BRIEF DESCRIPTION OF THE DRAWINGS
The disclosure will be described and explained with additional specificity and detail with the accompanying figures in which: FIG. 1 is a block diagram representation of a system for validation of authenticity of an authorized user in accordance with an embodiment of the present disclosure;
FIG. 2 is a block diagram representation of an exemplary embodiment of the system for validation of the authenticity of the authorized user of FIG. 1 in accordance with an embodiment of the present disclosure;
FIG. 3 is a block diagram of a validation computer or a validation server in accordance with an embodiment of the present disclosure; and
FIG. 4 is a flow chart representing steps involved in a method for validation of authenticity of an authorized user in accordance with an embodiment of the present disclosure.
Further, those skilled in the art will appreciate that elements in the figures are illustrated for simplicity and may not have necessarily been drawn to scale. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the figures by conventional symbols, and the figures may show only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the figures with details that will be readily apparent to those skilled in the art having the benefit of the description herein.
DETAILED DESCRIPTION
For the purpose of promoting an understanding of the principles of the disclosure, reference will now be made to the embodiment illustrated in the figures and specific language will be used to describe them. It will nevertheless be understood that no limitation of the scope of the disclosure is thereby intended. Such alterations and further modifications in the illustrated system, and such further applications of the principles of the disclosure as would normally occur to those skilled in the art are to be construed as being within the scope of the present disclosure.
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such a process or method. Similarly, one or more devices or sub-systems or elements or structures or components preceded by "comprises... a" does not, without more constraints, preclude the existence of other devices, sub-systems, elements, structures, components, additional devices, additional sub-systems, additional elements, additional structures or additional components. Appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but not necessarily do, all refer to the same embodiment.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by those skilled in the art to which this disclosure belongs. The system, methods, and examples provided herein are only illustrative and not intended to be limiting.
In the following specification and the claims, reference will be made to a number of terms, which shall be defined to have the following meanings. The singular forms “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise.
Embodiments of the present disclosure relate to a system for validation of authenticity of an authorized user. Basically, the authorized user uses a digital identifier and a password to log in on a plurality of platforms for security purposes and perform a plurality of operations on the corresponding plurality of platforms. If a fraudster gets access to the digital identifier and the password which belongs to the authorized user, then the fraudster can misuse the account of the authorized user for self-benefit. However, if the digital identifier of the authorized user is kept in sleep mode, then even if the fraudster gets access to the corresponding digital identifier and the password, the fraudster cannot log in. The system as described hereafter in FIG. 1 is the system for validation of the authenticity of the authorized user by enabling the authorized user to change a status of the digital identifier to an awake mode only when there is a need and for the rest of the time, the digital identifier remains in the sleep mode.
FIG. 1 is a block diagram representation of a system (10) for validation of authenticity of an authorized user in accordance with an embodiment of the present disclosure. Basically, the authorized user may use a digital identifier to log in on a plurality of platforms. In one embodiment, the authorized user needs to link the digital identifier of the authorized user to a centralized platform for the authorized user to prevent a fraudster from misusing the digital identifier.
As used herein, the term “digital identifier” is defined as a user identifier commonly used to log on to a website, an application, an online service, or the like. In one embodiment, the digital identifier includes an authorized user identifier including one of an authorized user name, a contact number, an e-mail identifier, a social media identifier, a transactional identifier, and the like. In one embodiment, the social media identifier includes a social networking identifier, a microblogging identifier, a visual media sharing identifier, and the like. As used herein, the term “transactional identifier” is defined as an identifier used by a user to perform one or more monetary transactions.
Moreover, a domain associated with the plurality of platforms needs to be linked to the centralized platform to enable the authorized user to link the corresponding digital identifier with the centralized platform. Thus, the system (10) herein represents the centralized platform, wherein the system (10) includes one or more processors (20). The system (10) also includes a domain linking subsystem (30) operable by the one or more processors (20). The domain linking subsystem (30) links the domain associated with at least one of the plurality of platforms with the centralized platform, wherein the authorized user is registered on at least one of the plurality of platforms via the digital identifier.
As used herein, the term “domain” in computing is defined as a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular organization or individual. In one embodiment, the domain associated with at least one of the plurality of platforms includes one of a social media domain, an E- commerce domain, a transaction-related domain, or the like. The plurality of platforms includes a plurality of online platforms.
Further, the system (10) includes a credential verification subsystem (50) operable by the one or more processors (20). The credential verification subsystem (50) is operatively coupled to the domain linking subsystem (30). The credential verification subsystem (50) fetches a unique identifier linked to a user device (55) upon linking the domain with the centralized platform, wherein the user device (55) is associated with the authorized user. In one embodiment, the unique identifier fetched includes a contact number of the authorized user, or any identifier associated with the user device (55) wherein the unique identifier is housed within the user device (55). In one embodiment, the user device (55) includes a mobile phone, a laptop, a tablet, a desktop computer, or the like. In another embodiment, the unique identifier fetched includes one of a contact number, International Mobile Equipment Identity (IMEI) number, and the like. In one exemplary embodiment, a unique device identifier is used as the unique identifier when the user device includes the desktop computer. The unique device identifier may include a hardware identifier, a machine identifier, a universally unique identifier, or the like.
The credential verification subsystem (50) also checks for presence of the digital identifier linked to the corresponding unique identifier in a database (as shown in FIG. 2) to generate a verification result, wherein the database is associated with the corresponding domain. In one embodiment, the verification result includes one of a positive verification result and a negative verification result.
In one embodiment, the credential verification subsystem (50) generates the positive verification result when the digital identifier linked to the corresponding unique identifier is present in the database. In another embodiment, the credential verification subsystem (50) generates the negative verification result when there is no digital identifier found linked to the corresponding unique identifier in the database.
Further, the system (10) includes a digital identifier linking subsystem (60) operable by the one or more processors (20). The digital identifier linking subsystem (60) is operatively coupled to the credential verification subsystem (50). The digital identifier linking subsystem (60) retrieves the digital identifier from the corresponding database upon generation of the positive verification result by the credential verification subsystem (50). The digital identifier linking subsystem (60) also links the digital identifier retrieved with the centralized platform.
Moreover, the system (10) also includes a status control subsystem (70) operable by the one or more processors (20). The status control subsystem (70) is operatively coupled to the digital identifier linking subsystem (60). The status control subsystem (70) sets a status of the digital identifier linked to the centralized platform to a sleep mode upon linking. In one embodiment, setting the status of the digital identifier which is been verified on the centralized platform to the sleep mode prevents misusage of the corresponding digital identifier by a user who is a fraudster. The status control subsystem (70) also enables the authorized user to alter the status of the digital identifier linked to an awake mode for a pre-defined time interval. In one embodiment, the pre-defined time interval includes a very short time interval ranging from about a few microseconds to about a few seconds.
Basically, the digital identifier may be used by the authorized user to log in on the plurality of platforms. In such a scenario, the authenticity of the authorized user who is entering the corresponding digital identifier needs to be validated. Thus, the status of the digital identifier on the centralized platform may have to be checked to validate the authenticity of the authorized user. The system (10) includes a validation subsystem (80) operable by the one or more processors (20). The validation subsystem (80) is operatively coupled to the status control subsystem (70). The validation subsystem (80) receives the digital identifier when the authorized user is making the login on at least one of the plurality of platforms.
The validation subsystem (80) also detects the status of the corresponding digital identifier on the centralized platform to generate a validation result. In one embodiment, the validation result includes an approval to proceed and login on the corresponding at least one of the plurality of platforms when the status of the digital identifier as detected by the validation subsystem (80) is in the awake mode. In one embodiment, the validation result includes a rejection to proceed and login on the corresponding at least one of the plurality of platforms when the status of the digital identifier as detected by the validation subsystem (80) is in the sleep mode.
Also, the validation subsystem (80) generates a notification for the authorized user upon generation of the validation result by the validation subsystem (80), wherein the validation result includes the rejection to proceed and login on the corresponding at least one of the plurality of platforms. In one embodiment, the notification is sent to the authorized user via a text message, an e-mail, a pop-up on the centralized platform, and the like. In one embodiment, the authorized user uses the digital identifier to perform a plurality of operations upon altering the status of the digital identifier on the centralized platform to the awake mode. In one embodiment, the plurality of operations includes booking items for purchasing, exchanging information, making payments, and the like. The status control subsystem (70) also sets the status to the sleep mode automatically upon one of a completion of the pre-defined time interval or the completion of detecting the status by the validation subsystem (80).
FIG. 2 is a block diagram representation of an exemplary embodiment of the system (10) for validation of the authenticity of the authorized user of FIG. 1 in accordance with an embodiment of the present disclosure. The system (10) herein represents the centralized platform, wherein the system (10) includes the one or more processors (20). A person ‘x’ (90) is working in a company (100) named ‘abc’. The person ‘x’ (90) needs to log in on a company’s platform via a login identifier (ID) which is ‘x@abc.com’ to work in that particular company (100). The person ‘x’ (90) needs to link the login ID with the centralized platform to prevent the misuse of the corresponding login ID by any fraudster. Moreover, for the person ‘x’ (90) to link the login ID with the centralized platform, a domain associated with the company’s platform needs to be linked with the centralized platform.
Thus, the domain linking subsystem (30) of the system (10) links the domain associated with the company’s platform with the centralized platform, wherein the domain includes ‘abc.com’. Further, the domain is associated with the database (120), wherein one or more credentials of the person ‘x’ (90) are pre-stored in the database (120). Also, the person ‘x’ (90) is registered on the company’s platform via the corresponding login ID.
Further, the person ‘x’ (90) wants to link the login ID with the centralized platform and hence trues to get access to the centralized platform via a mobile phone (125). Moreover, the credential verification subsystem (50) of the system (10) fetches a contact number linked to the mobile phone (125) upon linking the domain with the centralized platform, wherein the mobile phone (125) belongs to the person ‘x’ (90). Later, the credential verification subsystem (50) checks for the presence of the login ID linked to the corresponding contact number in the database (120) to generate the verification result. Further, the login ID is supposed to be retrieved from the database (120) in order to link the login ID with the centralized platform. Thus, the digital identifier linking subsystem (60) of the system (10) retrieves the login ID from the database (120) upon generation of the positive verification result by the credential verification subsystem (50). Later, the digital identifier linking subsystem (60) links the login ID retrieved with the centralized platform.
Moreover, the status control subsystem (70) of the system (10) sets the status of the login ID to the sleep mode upon linking. Also, the status control subsystem (70) enables the person ‘x’ (90) to alter the status of the login ID linked to an awake mode for the pre-defined time interval.
Further, the validation subsystem (80) of the system (10) receives the login ID, when the person ‘x’ (90) tries to log in to the company’s platform by entering the login ID and the password. Further, the validation subsystem (80) detects the status of the corresponding login ID on the centralized platform to generate the validation result. Further, for the person ‘x’ (90) to receive the validation result including the approval to proceed, the person ‘x’ (90) needs to alter the status of the login ID to the awake mode.
The validation subsystem (80) generates the validation result which includes the rejection to proceed and the person ‘x’ (90) receives the notification when the status of the login ID is in the sleep mode. In such a case, the person ‘x’ (90) can alter the status on the centralized platform to the awake mode and then proceed with the login process. Suppose the fraudster is trying to login to the company’s platform, then since the person ‘x’ (90) gets the notification of such fraudulent activity, can stay alert and take preventive measures to prevent such fraudulent activity to happen in the future. Moreover, the status control subsystem (70) sets the status to the sleep mode automatically upon one of the completion of the pre-defined time interval or the completion of detecting the status by the validation subsystem (80).
Furthermore, as used herein, the person ‘x’ (90), the login ID, the company’s platform, and the mobile phone (125) are substantially similar to the authorized user, the digital identifier, at least one of the plurality of platforms, and the user device (55) respectively of FIG. 1 FIG. 3 is a block diagram of a validation computer or a validation server (140) in accordance with an embodiment of the present disclosure. The validation server (140) includes processor(s) (150), and a memory (160) coupled to a bus (170). As used herein, the processor(s) (150) and the memory (160) are substantially similar to the system (10) of FIG. 1. Here, the memory (160) is located in a local storage device.
The processor(s) (150), as used herein, means any type of computational circuit, such as but not limited to, a microprocessor, a microcontroller, a complex instruction set computing microprocessor, a reduced instruction set computing microprocessor, a very long instruction word microprocessor, an explicitly parallel instruction computing microprocessor, a digital signal processor, or any other type of processing circuit, or a combination thereof.
Computer memory elements may include any suitable memory device(s) for storing data and executable program, such as read only memory, random access memory, erasable programmable read only memory, electrically erasable programmable read only memory, hard drive, removable media drive for handling memory cards and the like. Embodiments of the present subject matter may be implemented in conjunction with program modules, including functions, procedures, data structures, and application programs, for performing tasks, or defining abstract data types or low-level hardware contexts. Executable program stored on any of the above-mentioned storage media may be executable by the processor(s) (150).
The memory (160) includes a plurality of subsystems stored in the form of executable program which instructs the processor(s) (150) to perform method steps illustrated in FIG. 3. The memory (160) has following subsystems: a domain linking subsystem (30), a credential verification subsystem (50), a digital identifier linking subsystem (60), a status control subsystem (70), and a validation subsystem (80).
The domain linking subsystem (30) is configured to link a domain associated with at least one of a plurality of platforms with a centralized platform, wherein the authorized user is registered on at least one of the plurality of platforms via a digital identifier.
The credential verification subsystem (50) is configured to fetch a unique identifier linked to a user device (55) upon linking the domain with the centralized platform, wherein the user device (55) is associated with the authorized user. The credential verification subsystem (50) is also configured to check for presence of the digital identifier linked to the corresponding unique identifier in a database (120) to generate a verification result, wherein the database (120) is associated with the corresponding domain.
The digital identifier linking subsystem (60) is configured to retrieve the digital identifier from the corresponding database (120) upon generation of a positive verification result by the credential verification subsystem (50). The digital identifier linking subsystem (60) is also configured to link the digital identifier retrieved with the centralized platform.
The status control subsystem (70) is configured to set a status of the digital identifier linked to the centralized platform to a sleep mode upon linking. The status control subsystem (70) is also configured to enable the authorized user to alter the status of the digital identifier linked to an awake mode for a pre-defined time interval.
The validation subsystem (80) is configured to receive the digital identifier when the authorized user is making a login on at least one of the plurality of platforms. The validation subsystem (80) is also configured to detect the status of the corresponding digital identifier on the centralized platform to generate a validation result.
Further, the status control subsystem (70) is configured to set the status to the sleep mode automatically upon one of completion of the pre-defined time interval, or completion of detecting the status by the validation subsystem (80).
FIG. 4 is a flow chart representing steps involved in a method (180) for validation of authenticity of an authorized user in accordance with an embodiment of the present disclosure. The method (180) includes linking a domain associated with at least one of a plurality of platforms with a centralized platform, wherein the authorized user is registered on at least one of the plurality of platforms via a digital identifier in step 190. In one embodiment, linking the domain associated with at least one of the plurality of platforms with the centralized platform includes linking the domain associated with at least one of the plurality of platforms with the centralized platform by a domain linking subsystem (30). Furthermore, the method (180) includes fetching a unique identifier linked to a user device upon linking the domain with the centralized platform, wherein the user device is associated with the authorized user in step 200. In one embodiment, fetching the unique identifier linked to the user device includes fetching the unique identifier linked to the user device by a credential verification subsystem (50).
Furthermore, the method (180) also includes checking for a presence of the digital identifier linked to the corresponding unique identifier in a database to generate a verification result, wherein the database is associated with the corresponding domain in step 210. In one embodiment, checking for the presence of the digital identifier linked to the corresponding unique identifier in the database includes checking for the presence of the digital identifier linked to the corresponding unique identifier in the database by the credential verification subsystem (50).
Furthermore, the method (180) also includes retrieving the digital identifier from the corresponding database upon generation of a positive verification result by the credential verification subsystem in step 220. In one embodiment, retrieving the digital identifier from the corresponding database includes retrieving the digital identifier from the corresponding database by a digital identifier linking subsystem (60).
Furthermore, the method (180) also includes linking the digital identifier retrieved with the centralized platform in step 230. In one embodiment, linking the digital identifier retrieved with the centralized platform includes linking the digital identifier retrieved with the centralized platform by the digital identifier linking subsystem (60).
Furthermore, the method (180) also includes setting a status of the digital identifier linked to the centralized platform to a sleep mode upon linking in step 240. In one embodiment, setting the status of the digital identifier linked to the centralized platform to the sleep mode includes setting the status of the digital identifier linked to the centralized platform to the sleep mode by a status control subsystem (70).
Furthermore, the method (180) also includes enabling the authorized user to alter the status of the digital identifier linked to an awake mode for a pre-defined time interval in step 250. In one embodiment, enabling the authorized user to alter the status of the digital identifier linked to the awake mode for the pre-defined time interval includes enabling the authonzed user to alter the status of the digital identifier linked to the awake mode for the pre-defined time interval by the status control subsystem (70).
Furthermore, the method (180) also includes receiving the digital identifier when the authorized user is making a login on at least one of the plurality of platforms in step 260. In one embodiment, receiving the digital identifier includes receiving the digital identifier by a validation subsystem (80).
Furthermore, the method (180) also includes detecting the status of the corresponding digital identifier on the centralized platform for generating a validation result in step 270. In one embodiment, detecting the status of the corresponding digital identifier on the centralized platform includes detecting the status of the corresponding digital identifier on the centralized platform by the validation subsystem (80).
In one exemplary embodiment, generating the validation result includes generating the validation result including an approval to proceed and login on the corresponding at least one of the plurality of platforms when the status of the digital identifier as detected by the validation subsystem is in the awake mode. In another exemplary embodiment, generating the validation result includes generating the validation result including a rejection to proceed and login on the corresponding at least one of the plurality of platforms when the status of the digital identifier as detected by the validation subsystem is in the sleep mode.
Furthermore, the method (180) also includes setting the status to the sleep mode automatically upon one of completion of the pre-defined time interval, or completion of detecting the status by the validation subsystem in step 280. In one embodiment, setting the status to the sleep mode automatically includes setting the status to the sleep mode automatically by the status control subsystem (70).
Further, from a technical effect point of view, linking the domain of at least one of a plurality of platforms with the centralized platform, checking for the presence of the digital identifier linked to the unique identifier in the database of the domain, wherein the unique identifier is associated with the user device, linking the digital identifier retrieved from the database with the centralized platform, setting the status of the digital identifier to the sleep mode upon linking, enabling the authorized user to alter the status and setting the status back to the sleep mode upon one of completion of the pre-defined time interval, or completion of detecting the status by the validation subsystem, and detecting the status upon receiving the digital identifier when the authorized user is making the login on at least one of the plurality of platforms by the domain linking subsystem, the credential verification subsystem, the digital identifier linking subsystem, the status control subsystem, and the validation subsystem respectively of the overall system results in improving processing speed and reducing processing time taken by the one or more processors of the system.
Various embodiments of the present disclosure enable the authorized user to prevent any kind of misuse of the digital identifier of the authorized user as the digital identifier remains in the sleep mode all the time. The authorized user can alter the status to the awake mode and use the digital identifier to perform an operation, and after one of completion of the pre-defined time interval, or completion of detecting the status, the status gets updated automatically to the sleep mode. Thus, preventing the fraudster from misusing the corresponding digital identifier as the digital identifier remains in sleep mode until the authorized user changes the status to the awake mode.
Further, the system is more efficient, more reliable, cost-effective, and the method steps implementation is quick as the system only adds an additional layer of protection to an existing system which performs the corresponding operation. Also, the status can be altered to the awake mode upon a single click by the user via the user device, thereby making the system efficient in terms of time. Further, there is no secret code used to do so which can get leaked.
Moreover, there is no additional hardware required as the system works with the existing hardware, thereby making the implementation cost-effective, easy, and quick. Also, the system eliminates processing of one or more unauthorized transactions which otherwise might have occurred, thereby saving huge cost used for the processing and storing of data associated to such processing in the server and the database.
While specific language has been used to describe the disclosure, any limitations arising on account of the same are not intended. As would be apparent to a person skilled in the art, various working modifications may be made to the method in order to implement the inventive concept as taught herein. The figures and the foregoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, order of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts need to be necessarily performed. Also, those acts that are not dependant on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples.

Claims

I/WE CLAIM:
1. A system (10) for validation of authenticity of an authorized user, wherein the system (10) comprises: one or more processors (20); a domain linking subsystem (30) operable by the one or more processors (20), wherein the domain linking subsystem (30) is configured to link a domain associated with at least one of a plurality of platforms with a centralized platform, wherein the authorized user is registered on at least one of the plurality of platforms via a digital identifier; a credential verification subsystem (50) operable by the one or more processors (20), wherein the credential verification subsystem (50) is configured to: fetch a unique identifier linked to a user device (55) upon linking the domain with the centralized platform, wherein the user device (55) is associated with the authorized user; and check for a presence of the digital identifier linked to the corresponding unique identifier in a database (120) to generate a verification result, wherein the database (120) is associated with the corresponding domain; a digital identifier linking subsystem (60) operable by the one or more processors (20), wherein the digital identifier linking subsystem (60) is configured to: retrieve the digital identifier from the corresponding database (120) upon generation of a positive verification result by the credential verification subsystem (50); and link the digital identifier retrieved with the centralized platform; a status control subsystem (70) operable by the one or more processors (20), wherein the status control subsystem (70) is configured to: set a status of the digital identifier linked to the centralized platform to a sleep mode upon linking; and enable the authorized user to alter the status of the digital identifier linked to an awake mode for a pre-defined time interval; and a validation subsystem (80) operable by the one or more processors (20), wherein the validation subsystem (80) is configured to: receive the digital identifier when the authorized user is making a login on at least one of the plurality of platforms; and detect the status of the corresponding digital identifier on the centralized platform to generate a validation result, wherein the status control subsystem (70) is configured to set the status to the sleep mode automatically upon one of completion of the pre-defined time interval, or completion of detecting the status by the validation subsystem (80).
2. The system (10) as claimed in claim 1, wherein the digital identifier comprises an authorized user identifier comprising one of an authorized user name, a contact number, an e-mail identifier, a social media identifier, and a transactional identifier.
3. The system (10) as claimed in claim 1, wherein the domain associated with at least one of the plurality of platforms comprises one of a social media domain, an E-commerce domain, or a transaction-related domain, wherein the plurality of platforms comprises a plurality of online platforms.
4. The system (10) as claimed in claim 1, wherein the user device (55) includes a mobile phone, a laptop, a tablet, or a desktop computer.
5. The system (10) as claimed in claim 1, wherein the unique identifier fetched comprises a contact number of the authorized user, or any identifier associated with the user device (55), wherein the unique identifier is housed within the user device (55).
6. The system (10) as claimed in claim 1, wherein the validation result comprises an approval to proceed and login on the corresponding at least one of the plurality of platforms when the status of the digital identifier as detected by the validation subsystem (80) is in the awake mode.
7. The system (10) as claimed in claim 1, wherein the validation result comprises a rejection to proceed and login on the corresponding at least one of the plurality of platforms when the status of the digital identifier as detected by the validation subsystem (80) is in the sleep mode.
8. A method ( 180) for validation of authenticity of an authorized user, wherein the method (180) comprises: linking, by a domain linking subsystem (30), a domain associated with at least one of a plurality of platforms with a centralized platform, wherein the authorized user is registered on at least one of the plurality of platforms via a digital identifier; (190) fetching, by a credential verification subsystem (50), a unique identifier linked to a user device upon linking the domain with the centralized platform, wherein the user device is associated with the authorized user; (200) checking, by the credential verification subsystem (50), for a presence of the digital identifier linked to the corresponding unique identifier in a database to generate a verification result, wherein the database is associated with the corresponding domain; (210) retrieving, by a digital identifier linking subsystem (60), the digital identifier from the corresponding database upon generation of a positive verification result by the credential verification subsystem; (220) linking, by the digital identifier linking subsystem (60), the digital identifier retrieved with the centralized platform; (230) setting, by a status control subsystem (70), a status of the digital identifier linked to the centralized platform to a sleep mode upon linking; (240)
19 enabling, by the status control subsystem (70), the authorized user to alter the status of the digital identifier linked to an awake mode for a pre-defined time interval; (250) receiving, by a validation subsystem (80), the digital identifier when the authorized user is making a login on at least one of the plurality of platforms; (260) detecting, by the validation subsystem (80), the status of the corresponding digital identifier on the centralized platform for generating a validation result; and (270) setting, by the status control subsystem (70), the status to the sleep mode automatically upon one of completion of the pre-defined time interval, or completion of detecting the status by the validation subsystem (280).
9. The method (180) as claimed in claim 8, wherein generating the validation result comprises generating the validation result comprising an approval to proceed and login on the corresponding at least one of the plurality of platforms when the status of the digital identifier as detected by the validation subsystem is in the awake mode.
10. The method (180) as claimed in claim 8, wherein generating the validation result comprises generating the validation result comprising a rejection to proceed and login on the corresponding at least one of the plurality of platforms when the status of the digital identifier as detected by the validation subsystem is in the sleep mode.
PCT/IB2020/062010 2020-11-02 2020-12-16 System and method for validation of authenticity of an authorized user WO2022090793A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN202041047792 2020-11-02
IN202041047792 2020-11-02

Publications (1)

Publication Number Publication Date
WO2022090793A1 true WO2022090793A1 (en) 2022-05-05

Family

ID=81381451

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2020/062010 WO2022090793A1 (en) 2020-11-02 2020-12-16 System and method for validation of authenticity of an authorized user

Country Status (1)

Country Link
WO (1) WO2022090793A1 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012166944A2 (en) * 2011-06-03 2012-12-06 Uc Group Limited Systems and methods for registration, validation, and monitoring of users over multiple websites

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012166944A2 (en) * 2011-06-03 2012-12-06 Uc Group Limited Systems and methods for registration, validation, and monitoring of users over multiple websites

Similar Documents

Publication Publication Date Title
US11252171B2 (en) Methods and systems for detecting abnormal user activity
US10592658B2 (en) Password recovery
US11108752B2 (en) Systems and methods for managing resetting of user online identities or accounts
US10462665B2 (en) Multifactor network authentication
US20190050551A1 (en) Systems and methods for authenticating users
US10176318B1 (en) Authentication information update based on fraud detection
US20150339477A1 (en) Risk assessment modeling
US20100175136A1 (en) System and method for security of sensitive information through a network connection
US20210099431A1 (en) Synthetic identity and network egress for user privacy
US10594685B2 (en) User selected key authentication
US10474836B1 (en) Systems and methods for a generated fraud sandbox
US10462126B2 (en) Self-adjusting multifactor network authentication
US20130305335A1 (en) Electronic transaction notification system and method
EP3061025A1 (en) Method and system for authenticating service
JP7401288B2 (en) System and method for changing account record passwords under threat of unauthorized access to user data
US10652276B1 (en) System and method for distinguishing authentic and malicious electronic messages
WO2022090793A1 (en) System and method for validation of authenticity of an authorized user
WO2015060950A1 (en) Method and system for authenticating service
CN103200246A (en) Network access control method and system based on dependable computing
US20240031386A1 (en) Digital Security Violation System
US20240129299A1 (en) Selectively and intelligently displaying authentication notifications to protect users
US20230359350A1 (en) Using a virtual keyboard to enter particular input
US20230262037A1 (en) Techniques for authenticating using uniquely assigned webpages
WO2022090794A1 (en) System and method for validation of authenticity of an authorized user for monetary transaction
US20160057620A1 (en) Method and apparatus for protecting user data

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20959676

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20959676

Country of ref document: EP

Kind code of ref document: A1