System and method for authenticating users
DCFirst Claim
1. A method for authenticating a user, comprising:
- receiving, by an application running on a mobile phone, a unique user input, said application processing said unique user input and generating a secret;
storing said secret at the mobile phone, said secret being stored with an identifier so as to be retrievable when the unique user input is received again by the mobile phone;
receiving at the mobile phone from a remote computer-based station a first communication comprising a request for user credentials of the user of the mobile phone, said first communication including the identifier associated with the secret;
responsive to said receiving, the mobile phone prompting a user via a user interface for the unique user input, verifying said unique user input, and transmitting to the remote computer-based station a second communication encoded using the secret.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials). The secret is stored in a directory such that it is retrievable when the unique user input is received via a user interface of a device on which the security application executes or is coupled with. Responsive to receiving an identifier associated with the secret, the security application prompts, e.g., via a user interface of the mobile phone, entry of the unique user input; and, subsequently, verifies the unique user input. Following such verification, the security application provides the secret for use in encoding a communication with a remote computer-based station. Entry of the user credentials may be required prior to the security application generating the secret, and may be responsive to receipt of an invitation (e.g., from the remote computer-based station) to generate it.
-
Citations
20 Claims
-
1. A method for authenticating a user, comprising:
-
receiving, by an application running on a mobile phone, a unique user input, said application processing said unique user input and generating a secret; storing said secret at the mobile phone, said secret being stored with an identifier so as to be retrievable when the unique user input is received again by the mobile phone; receiving at the mobile phone from a remote computer-based station a first communication comprising a request for user credentials of the user of the mobile phone, said first communication including the identifier associated with the secret; responsive to said receiving, the mobile phone prompting a user via a user interface for the unique user input, verifying said unique user input, and transmitting to the remote computer-based station a second communication encoded using the secret. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
sending, to an application running on a computing device, an invitation directed to a user of the computing device, whereby upon receipt of said invitation, said application (i) prompts the user of the computing device for a unique user input, (ii) processes the unique user input provided by the user of the computing device, (iii) responsive to processing said unique user input generates a secret, and (iv) stores said secret at the computing device along with an identifier so as to be retrievable when said unique user input is again provided by the user of the computing device; sending, from a remote computer-based station to the computing device, a first communication, said first communication including said identifier associated with the secret, whereby upon receipt of said first communication said application running on the computing device (i) prompts the user of the computing device for said unique user input, (ii) responsive to receiving said unique user input verifies said unique user input, and (iii) responsive to verifying said unique user input uses said secret to transmit to the remote computer-based station an encoded communication; and at the remote computer-based station, receiving said encoded communication. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification