CPC G06Q 20/3821 (2013.01) [G06Q 20/20 (2013.01); H04L 63/0884 (2013.01)] | 16 Claims |
1. A computer system for network-based, variable authentication protocols, comprising:
one or more processors; and
one or more computer-readable media having stored thereon executable instructions that, when executed by the one or more processors, configure the computer system to perform:
receive, from a point-of-sale computer system, at least:
information relating to a digital monetary transaction between a mobile device of a user and the point-of-sale computer system,
an identification associated with the user, wherein the identification is cryptographically signed by the user,
an identification associated with the point-of-sale computer system, and
location information relating to the point-of-sale computer system;
access, at a remote variable authentication protocol server, an initial authentication protocol dataset, wherein the initial authentication protocol dataset comprises at least:
a first authentication protocol associated with the identification associated with the point-of-sale computer system,
a second authentication protocol associated with the location information relating to the point-of-sale computer system,
a third authentication protocol associated with the information relating to the digital monetary transaction, wherein each of the first authentication protocol, the second authentication protocol, and the third authentication protocol comprise a different list of required proofs and attestations;
generate, at the remote variable authentication protocol server, a variable authentication protocol dataset by removing from the initial authentication protocol dataset any of the first authentication protocol, the second authentication protocol, or the third authentication protocol that are superseded by another authentication protocol within the initial authentication protocol dataset, by:
identifying a requirement for a proof of a particular claim within the first authentication protocol, the second authentication protocol, or the third authentication protocol,
identifying a requirement for an attestation of the particular claim within the first authentication protocol, the second authentication protocol, or the third authentication protocol,
determining that the attestation supersedes the proof, and
removing from the initial authentication protocol dataset the requirement for the proof of the particular claim;
communicate the variable authentication protocol dataset to the point-of-sale computer system;
receive, from the point-of-sale computer system, at least one authentication token, wherein each authentication token comprises at least one proof and/or attestation of identifying information that is encrypted using a public key of a third-party that is requesting the at least one proof and/or attestation;
validate that the at least one authentication token conforms with the variable authentication protocol dataset; and
in response to the validation of the at least one authentication token, process the digital monetary transaction.
|