-
公开(公告)号:US20210385086A1
公开(公告)日:2021-12-09
申请号:US17408293
申请日:2021-08-20
Applicant: Google LLC
Inventor: Zhong Wang , Gang Wang
Abstract: At least one aspect is directed to improving the performance of real-time verification of online identity. The issuer computing system can receive a request to generate a composite token, the composite token configured to authorize certain verifying parties to authenticate a first-party token comprising information about a client. The issuer can generate a composite token using cryptographic keys and distribute it to the client, who can distribute it to other content item networks. The verifying parties can receive the composite token from the content item networks, use a cryptographic key verify the authenticity of the token corresponding to the client device, and use the token to further process content item operations. The system can distribute the cryptographic keys prior to the generation and verification of the composite token, and as such allow the parties to verify the composite token in real-time without contacting outside verification parties.
-
公开(公告)号:US11102004B2
公开(公告)日:2021-08-24
申请号:US16553599
申请日:2019-08-28
Applicant: Google LLC
Inventor: Zhong Wang , Gang Wang
Abstract: At least one aspect is directed to improving the performance of real-time verification of online identity. The issuer computing system can receive a request to generate a composite token, the composite token configured to authorize certain verifying parties to authenticate a first-party token comprising information about a client. The issuer can generate a composite token using cryptographic keys and distribute it to the client, who can distribute it to other content item networks. The verifying parties can receive the composite token from the content item networks, use a cryptographic key verify the authenticity of the token corresponding to the client device, and use the token to further process content item operations. The system can distribute the cryptographic keys prior to the generation and verification of the composite token, and as such allow the parties to verify the composite token in real-time without contacting outside verification parties.
-
公开(公告)号:US20200344058A1
公开(公告)日:2020-10-29
申请号:US16553599
申请日:2019-08-28
Applicant: Google LLC
Inventor: Zhong Wang , Gang Wang
Abstract: At least one aspect is directed to improving the performance of real-time verification of online identity. The issuer computing system can receive a request to generate a composite token, the composite token configured to authorize certain verifying parties to authenticate a first-party token comprising information about a client. The issuer can generate a composite token using cryptographic keys and distribute it to the client, who can distribute it to other content item networks. The verifying parties can receive the composite token from the content item networks, use a cryptographic key verify the authenticity of the token corresponding to the client device, and use the token to further process content item operations. The system can distribute the cryptographic keys prior to the generation and verification of the composite token, and as such allow the parties to verify the composite token in real-time without contacting outside verification parties.
-
公开(公告)号:US12101404B2
公开(公告)日:2024-09-24
申请号:US17408293
申请日:2021-08-20
Applicant: Google LLC
Inventor: Zhong Wang , Gang Wang
CPC classification number: H04L9/3213 , H04L9/083 , H04L9/3247 , H04L9/3297 , H04L67/53 , H04L2463/102 , H04L2463/121
Abstract: At least one aspect is directed to improving the performance of real-time verification of online identity. The issuer computing system can receive a request to generate a composite token, the composite token configured to authorize certain verifying parties to authenticate a first-party token comprising information about a client. The issuer can generate a composite token using cryptographic keys and distribute it to the client, who can distribute it to other content item networks. The verifying parties can receive the composite token from the content item networks, use a cryptographic key verify the authenticity of the token corresponding to the client device, and use the token to further process content item operations. The system can distribute the cryptographic keys prior to the generation and verification of the composite token, and as such allow the parties to verify the composite token in real-time without contacting outside verification parties.
-
-
-