×

Public authentication systems and methods

  • US 10,263,981 B1
  • Filed: 11/30/2016
  • Issued: 04/16/2019
  • Est. Priority Date: 12/02/2015
  • Status: Active Grant
First Claim
Patent Images

1. An authentication system for electronic data, comprising:

  • a backend system, comprising;

    non-volatile storage storing;

    the electronic data, wherein permission to perform actions on the electronic data is limited to a user or set of users; and

    a set of user profiles, wherein at least one of the set of user profiles comprises a user profile associated with the user or the set of users; and

    at least one hardware-based processor configured to;

    receive, from a client system, a request to perform an action on the electronic data;

    receive primary authentication information and secondary authentication information, from the client system, a secondary device, or both;

    authenticate the request by;

    identifying a user profile associated with the primary authentication information;

    determining whether the user profile associated with the primary authentication information is associated with the user or set of users;

    determining whether the primary authentication information matches expected primary authentication of the user profile associated with the primary authentication information; and

    determining whether the secondary authentication information matches or sufficiently overlaps with expected secondary authentication information of the user profile;

    determining the request is authenticated when;

    the user profile associated with the primary authentication information is associated with the user or set of users;

    the primary authentication information matches the expected primary authentication of the user profile associated with the primary authentication information; and

    the secondary authentication information matches or sufficiently overlaps with the expected secondary authentication information of the user profile; and

    determining the request is not authenticated when;

    the user profile associated with the primary authentication information is not associated with the user or set of users;

    the primary authentication information does not match the expected primary authentication of the user profile associated with the primary authentication information;

    orthe secondary authentication information does not match or sufficiently overlap the expected secondary authentication information of the user profile; and

    when the request is authenticated, perform the action; and

    when the request is not authenticated, deny performance of the action.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×