US 12,088,725 B2
Authentication through use of an unforgeable hash function based credential
Dhryl Anton, Miami, FL (US); and Michael McFall, Miami, FL (US)
Assigned to THE ONLI CORPORATION, Miami, FL (US)
Filed by THE ONLI CORPORATION, Miami, FL (US)
Filed on Apr. 26, 2022, as Appl. No. 17/730,168.
Application 17/730,168 is a continuation of application No. 16/507,028, filed on Jul. 10, 2019, granted, now 11,343,101.
Application 16/507,028 is a continuation of application No. 15/230,423, filed on Aug. 7, 2016, granted, now 10,396,992, issued on Aug. 27, 2019.
Claims priority of provisional application 62/203,647, filed on Aug. 11, 2015.
Prior Publication US 2022/0263660 A1, Aug. 18, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 17/00 (2019.01); G06F 16/22 (2019.01); G06F 21/31 (2013.01); G06F 21/62 (2013.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/3236 (2013.01) [G06F 16/2219 (2019.01); G06F 21/31 (2013.01); G06F 21/6227 (2013.01); H04L 63/0815 (2013.01); G06F 2221/2149 (2013.01); H04L 63/0807 (2013.01); H04L 63/0876 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for electronic authentication comprising:
receiving an authentication request from a first device;
receiving an identity claim from at least one of the first device and a second device associated with the first device, the identity claim comprising a device root hash computed by a hash function using inputs comprising a previously calculated hash value of the device;
retrieving data of a user profile associated with at least one of the first device and a user of the first device, the user profile comprising a profile root hash computed by the hash function using inputs comprising a previously calculated hash value of the user profile,
extracting the profile root hash from the user profile associated with at least one of the first device and the user of the first device;
comparing the device root hash with the profile root hash to verify an identity of at least one of the first device and the user of the first device;
determining that the device root hash and the profile root hash of the user profile are not identical; and
denying the authentication request and optionally locking the user profile to deny a prospective authentication request by at least one of the device and the user of the device.