ASYNCHRONOUS CRYPTOGRAM-BASED AUTHENTICATION PROCESSES
The disclosed embodiments include computer-implemented devices and processes that asynchronously authenticate data. For example, a network-connected device may obtain data identifying a product, and obtain cryptographic data from an executed application through a programmatic interface. The cryptogr...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The disclosed embodiments include computer-implemented devices and processes that asynchronously authenticate data. For example, a network-connected device may obtain data identifying a product, and obtain cryptographic data from an executed application through a programmatic interface. The cryptographic data may be generated by a first computer system in response to a verification of authentication credentials, and the cryptographic data may include a digital signature of the first computer system. The device may also transmit the product data and the cryptographic data to a second computer system, which may be configured to validate the cryptographic data and establish an authenticity of the product data. The device may receive data from the second computer system that confirms the authenticity of the product data, and in response to the received confirmation data, perform an operation involving the product data. |
---|