Method and system for controlling online user account using a mobile device
First Claim
1. A method comprising:
- receiving, at a computing device associated with a service provider, from a user device over a network, information associated with an action requested to be performed on said user device in association with an account provided by the service provider;
in response to receiving the action information, automatically communicating, via the computing device, a request to said user device, said request comprising a message providing said user device functionality to authenticate said requested action;
receiving, at said computing device from said user device, data indicating a response to said request, said response data providing an indication of activity performed by a user of said user device upon viewing said request;
analyzing, via the computing device, said response data, said analysis comprising determining whether said response data represents activity that is performed by an account holder of said account or by a malicious user; and
communicating, via the computing device over the network, an instruction to lock said user device upon said analysis resulting in a determination said requested action was generated by said malicious user, said communication causing said user device to block access to programs installed on said user device while locked.
7 Assignments
0 Petitions
Accused Products
Abstract
A method and system for controlling online user account using a mobile device. The method includes receiving an option to lock an online account of a user from a service provider. The computer-implemented method also includes locking the online user account by using a mobile device. Further, the computer-implemented method includes initiating a user action at a later point of time. Furthermore, the computer-implemented method includes receiving an alert to unlock the online user account in order to perform the user action and obtaining an unlock password from the service provider. Moreover, the computer-implemented method includes unlocking the online user account with the unlock password by using the mobile device and performing the user action subsequent to the unlocking, thereby controlling the online user account using the mobile device. The system includes a computing device, a web browser, a service provider and a mobile device.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, at a computing device associated with a service provider, from a user device over a network, information associated with an action requested to be performed on said user device in association with an account provided by the service provider; in response to receiving the action information, automatically communicating, via the computing device, a request to said user device, said request comprising a message providing said user device functionality to authenticate said requested action; receiving, at said computing device from said user device, data indicating a response to said request, said response data providing an indication of activity performed by a user of said user device upon viewing said request; analyzing, via the computing device, said response data, said analysis comprising determining whether said response data represents activity that is performed by an account holder of said account or by a malicious user; and communicating, via the computing device over the network, an instruction to lock said user device upon said analysis resulting in a determination said requested action was generated by said malicious user, said communication causing said user device to block access to programs installed on said user device while locked. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable storage medium tangibly encoded with computer-executable instructions, that when executed by a computing device, perform a method comprising:
-
receiving, at the computing device associated with a service provider, from a user device over a network, information associated with an action requested to be performed on said user device in association with an account provided by the service provider; in response to receiving the action information, automatically communicating, via the computing device, a request to said user device, said request comprising a message providing said user device functionality to authenticate said requested action; receiving, at said computing device from said user device, data indicating a response to said request, said response data providing an indication of activity performed by a user of said user device upon viewing said request; analyzing, via the computing device, said response data, said analysis comprising determining whether said response data represents activity is performed by an account holder of said account or a malicious user; and communicating, via the computing device over the network, an instruction to lock said user device upon said analysis resulting in a determination said requested action was generated by said malicious user, said communication causing said user device to block access to programs installed on said user device while locked. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computing device comprising:
-
a processor; a non-transitory computer-readable storage medium for tangibly storing thereon program logic for execution by the processor, the program logic comprising; logic executed by the processor for receiving, at the computing device associated with a service provider, from a user device over a network, information associated with an action requested to be performed on said user device in association with an account provided by the service provider; logic executed by the processor for automatically communicating, via the computing device in response to receiving the action information, a request to said user device, said request comprising a message providing said user device functionality to authenticate said requested action; logic executed by the processor for receiving, at said computing device from said user device, data indicating a response to said request, said response data providing an indication of activity performed by a user of said user device upon viewing said request; logic executed by the processor for analyzing, via the computing device, said response data, said analysis comprising determining whether said response data represents activity is performed by an account holder of said account or a malicious user; and logic executed by the processor for communicating, via the computing device over the network, an instruction to lock said user device upon said analysis resulting in a determination said requested action was generated by said malicious user, said communication causing said user device to block access to programs installed on said user device while locked. - View Dependent Claims (18, 19, 20)
-
Specification