SYSTEMS AND METHODS FOR DISTRIBUTED VERIFICATION OF ONLINE IDENTITY

    公开(公告)号:US20210385086A1

    公开(公告)日:2021-12-09

    申请号:US17408293

    申请日:2021-08-20

    Applicant: Google LLC

    Abstract: At least one aspect is directed to improving the performance of real-time verification of online identity. The issuer computing system can receive a request to generate a composite token, the composite token configured to authorize certain verifying parties to authenticate a first-party token comprising information about a client. The issuer can generate a composite token using cryptographic keys and distribute it to the client, who can distribute it to other content item networks. The verifying parties can receive the composite token from the content item networks, use a cryptographic key verify the authenticity of the token corresponding to the client device, and use the token to further process content item operations. The system can distribute the cryptographic keys prior to the generation and verification of the composite token, and as such allow the parties to verify the composite token in real-time without contacting outside verification parties.

    Systems and methods for distributed verification of online identity

    公开(公告)号:US11102004B2

    公开(公告)日:2021-08-24

    申请号:US16553599

    申请日:2019-08-28

    Applicant: Google LLC

    Abstract: At least one aspect is directed to improving the performance of real-time verification of online identity. The issuer computing system can receive a request to generate a composite token, the composite token configured to authorize certain verifying parties to authenticate a first-party token comprising information about a client. The issuer can generate a composite token using cryptographic keys and distribute it to the client, who can distribute it to other content item networks. The verifying parties can receive the composite token from the content item networks, use a cryptographic key verify the authenticity of the token corresponding to the client device, and use the token to further process content item operations. The system can distribute the cryptographic keys prior to the generation and verification of the composite token, and as such allow the parties to verify the composite token in real-time without contacting outside verification parties.

    SYSTEMS AND METHODS FOR DISTRIBUTED VERIFICATION OF ONLINE IDENTITY

    公开(公告)号:US20200344058A1

    公开(公告)日:2020-10-29

    申请号:US16553599

    申请日:2019-08-28

    Applicant: Google LLC

    Abstract: At least one aspect is directed to improving the performance of real-time verification of online identity. The issuer computing system can receive a request to generate a composite token, the composite token configured to authorize certain verifying parties to authenticate a first-party token comprising information about a client. The issuer can generate a composite token using cryptographic keys and distribute it to the client, who can distribute it to other content item networks. The verifying parties can receive the composite token from the content item networks, use a cryptographic key verify the authenticity of the token corresponding to the client device, and use the token to further process content item operations. The system can distribute the cryptographic keys prior to the generation and verification of the composite token, and as such allow the parties to verify the composite token in real-time without contacting outside verification parties.

    Systems and methods for distributed verification of online identity

    公开(公告)号:US12101404B2

    公开(公告)日:2024-09-24

    申请号:US17408293

    申请日:2021-08-20

    Applicant: Google LLC

    Abstract: At least one aspect is directed to improving the performance of real-time verification of online identity. The issuer computing system can receive a request to generate a composite token, the composite token configured to authorize certain verifying parties to authenticate a first-party token comprising information about a client. The issuer can generate a composite token using cryptographic keys and distribute it to the client, who can distribute it to other content item networks. The verifying parties can receive the composite token from the content item networks, use a cryptographic key verify the authenticity of the token corresponding to the client device, and use the token to further process content item operations. The system can distribute the cryptographic keys prior to the generation and verification of the composite token, and as such allow the parties to verify the composite token in real-time without contacting outside verification parties.

Patent Agency Ranking