Direct authentication system and method via trusted authenticators
DCFirst Claim
Patent Images
1. A method of enhancing authentication of a user attempting to access an online system via a computer network, the method comprising:
- receiving by the online system, via the computer network, user-authentication information including a user-authentication code provided by an authentication system to the user via the computer network after an attempt by the user to access information of the online system, wherein;
the user-authentication code is information generated by the authentication system for authenticating the user,the user-authentication code is configured to be valid for a predetermined time,the user-authentication code is configured to become invalid after the predetermined time, andthe user-authentication code is configured to become invalid after a first use to authenticate the user;
providing by the online system, via the computer network, a user-authentication request to the authentication system, wherein the user-authentication request includes the user-authentication code and user-identification information of the user;
receiving by the online system, via the computer network, a response to the user-authentication request indicating whether the authentication system authenticated the user, wherein;
the user is authenticated using the user-authentication code and the user-identification information included in the authentication request,the response to the user-authentication request confirms authentication of the user if the user-authentication code is valid, andthe response to the user-authentication request denies authentication of the user if the user-authentication code is invalid; and
providing by the online system, via the computer network, the user access to the information of the online system.
2 Assignments
Litigations
0 Petitions
Reexamination
Accused Products
Abstract
Systems and methods are provided for enabling online entities to determine whether a user is truly the person who he says using a “two-factor” authentication technique and authenticating customer'"'"'s identity utilizing a trusted authenticator.
-
Citations
30 Claims
-
1. A method of enhancing authentication of a user attempting to access an online system via a computer network, the method comprising:
-
receiving by the online system, via the computer network, user-authentication information including a user-authentication code provided by an authentication system to the user via the computer network after an attempt by the user to access information of the online system, wherein; the user-authentication code is information generated by the authentication system for authenticating the user, the user-authentication code is configured to be valid for a predetermined time, the user-authentication code is configured to become invalid after the predetermined time, and the user-authentication code is configured to become invalid after a first use to authenticate the user; providing by the online system, via the computer network, a user-authentication request to the authentication system, wherein the user-authentication request includes the user-authentication code and user-identification information of the user; receiving by the online system, via the computer network, a response to the user-authentication request indicating whether the authentication system authenticated the user, wherein; the user is authenticated using the user-authentication code and the user-identification information included in the authentication request, the response to the user-authentication request confirms authentication of the user if the user-authentication code is valid, and the response to the user-authentication request denies authentication of the user if the user-authentication code is invalid; and providing by the online system, via the computer network, the user access to the information of the online system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for enhancing authentication of a user attempting to access an online system via a computer network, the system comprising one or more computing devices configured to perform operations comprising:
-
receiving by the online system, via the computer network, user-authentication information including a user-authentication code provided by an authentication system to the user via the computer network after an attempt by the user to access information of the online system, wherein; the user-authentication code is information generated by the authentication system for authenticating the user, the user-authentication code is configured to be valid for a predetermined time, the user-authentication code is configured to become invalid after the predetermined time, and the user-authentication code is configured to become invalid after a first use to authenticate the user; providing by the online system, via the computer network, a user-authentication request to the authentication system, wherein the user-authentication request includes the user-authentication code and user-identification information of the user; receiving by the online system, via the computer network, a response to the user-authentication request indicating whether the authentication system authenticated the user, wherein; the user is authenticated using the user-authentication code and the user-identification information included in the authentication request, the response to the user-authentication request confirms authentication of the user if the user-authentication code is valid, and the response to the user-authentication request denies authentication of the user if the user-authentication code is invalid; and providing by the online system, via the computer network, the user access to the information of the online system. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification