Process for authenticating an identity of a user
First Claim
1. A process for authenticating an identity of a user accessing a location in a secure manner using a communications device that is in direct communication with an independent server and in secondary communication with a second server, wherein the communications device has a user interface and an input module, the process including the steps of:
- i. hosting device information on the independent server for validation;
ii. generating and sending a user prompt from the device to the independent server, which prompt is validated by comparing the user prompt to the device information, and, if validated as correct, creating a device ID and transaction ID as indexes to identify the device on the database;
iii. generating a randomised keypad on the user interface;
iv. inserting and submitting a pass code by way of the randomized keypad;
v. relaying said pass code to the second server; and
vi. generating a second validation at the second server, using the pass code and thereby authenticating both user and device;
and wherein the randomized keypad is re-generated on each occasion that the user is required to provide user credentials, and where values of keypad keys are encrypted by the second server and communicated to the communication device via the independent server.
0 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a process for authenticating an identity of a user accessing a location in a secure manner using a communications device that is in direct communication with an independent server and in secondary communication with a second server, the communications device having a user interface and an input module, the process including the steps of hosting device information on the independent server for validation; generating and sending a user prompt from the device to the independent server for validation, and if validated as correct, creating a device ID and transaction ID as indexes to identify the device on the database; generating a randomised keypad on the user interface; inserting and submitting a pass code by way of the randomised keypad; relaying said pass code to the second server; and generating a second validation at the second server, using the pass code and thereby authenticating both user and device.
-
Citations
20 Claims
-
1. A process for authenticating an identity of a user accessing a location in a secure manner using a communications device that is in direct communication with an independent server and in secondary communication with a second server, wherein the communications device has a user interface and an input module, the process including the steps of:
-
i. hosting device information on the independent server for validation; ii. generating and sending a user prompt from the device to the independent server, which prompt is validated by comparing the user prompt to the device information, and, if validated as correct, creating a device ID and transaction ID as indexes to identify the device on the database; iii. generating a randomised keypad on the user interface; iv. inserting and submitting a pass code by way of the randomized keypad; v. relaying said pass code to the second server; and vi. generating a second validation at the second server, using the pass code and thereby authenticating both user and device; and wherein the randomized keypad is re-generated on each occasion that the user is required to provide user credentials, and where values of keypad keys are encrypted by the second server and communicated to the communication device via the independent server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A process for authenticating an identity of a user accessing a location in a secure manner using a communications device that is in direct communication with an independent server and in secondary communication with a second server, wherein the communications device has a user interface and an input module, the process including the steps of:
-
i. hosting device information on the independent server for validation; ii. generating and sending a user prompt from the device to the independent server, which prompt is validated by comparing the user prompt to the device information, and, if validated as correct, creating a device ID and transaction ID as indexes to identify the device on the database; iii. generating a randomised keypad on the user interface; iv. inserting and submitting a pass code by way of the randomized keypad; v. relaying said pass code to the second server; and vi. generating a second validation at the second server, using the pass code and thereby authenticating both user and device, wherein if device information is validated as either new or incorrect, as in step ii), the process including the further steps of; A. generating a request to the user to submit security information; B. inputting and transferring security information and the device information from the device to the independent server and the second server; C. storing the device information on the independent server; D. validating security information by the second server; E. if security information is validated as existing on second server the second server generating and communicating a request for user identity validation; F inputting user identity information, which if validated as correct, generating and sending a request to confirm device information with user; G. inputting device information via the device to the second server, which if correct, storing said device information on the independent server as authenticated; and H. granting access of said device to step iii). - View Dependent Claims (17, 18, 19, 20)
-
Specification