Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity and authentication system using aliases

An alias and identity technology, applied in the field of identity and verification systems using aliases, can solve problems such as not being able to meet all the needs of online communities

Inactive Publication Date: 2011-08-31
MICROSOFT CORP
View PDF7 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] While some verification systems provide satisfactory performance, current systems do not meet all the needs of online communities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity and authentication system using aliases
  • Identity and authentication system using aliases
  • Identity and authentication system using aliases

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Computer users often maintain different identities for different online sites and services. A single user can use various identifiers, such as email addresses, nicknames, user names, mobile phone numbers, game names or IDs, and other structures to reflect the user's online identity at different times and in different settings. Therefore, for example, a user can utilize a mobile phone number based on an existing network service, such as instant messaging ("IM") that can be operated with a mobile phone based on an existing network service. In addition, users can log in to online social networking sites with their usernames and use email addresses when logging in to their frequent flyer accounts.

[0024] Users can find it troublesome to maintain multiple scattered identities. For example, because more and more sites and services require account creation to use them, the proliferation of different account names and passwords will lead to user "password fatigue". For these u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An identity and authentication platform (122) utilizes a data model (400) that enables multiple identities such as e-mail addresses, mobile phone numbers, nicknames, gaming IDs, and other user IDs to be utilized as aliases (505) which are unique sub-identities of a main account name (512). A user (105) may utilize the aliases (505) supported by the platform (122) to project multiple different on-line identities while using the authentication credentials of the main account (512). The platform (122) is configured to expose the aliases (505) to various client applications and Internet-accessible sites and services (206) such as e-mail, instant messaging, media sharing, gaming and social networks, and the like, to enable the implementation of a variety of usage scenarios that employ aliases (505).

Description

Background technique [0001] For users and businesses, the Internet is constantly becoming more and more valuable. More and more people are using the Internet for everyday tasks, from shopping, banking and paying bills to consumer media and entertainment. E-commerce is constantly evolving with the commercial delivery of more services and content on the Internet, online communication and cooperation, and the creation of new ways for users to connect with each other. Currently, users can access online resources from a diverse collection of platforms including computers, mobile and smart phones, game consoles and other devices with network connectivity. [0002] When accessing some sites and services, users need to be verified so that the interaction is appropriate and not misused in certain ways. For example, a user trying to access an online bank account needs to be verified to prove that the user is the user he claims (ie, a legitimate bank customer who has an account or is autho...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/00
CPCG06F21/41
Inventor L·C·艾尔斯R·陈W-Q·M·郭N·马哈帕特洛
Owner MICROSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products