Method and system for information authentication
First Claim
Patent Images
1. An computer-implemented method for facilitating multi-party authentication, the method comprising:
- receiving, via a communication module, a first request from a primary user to associate a plurality of authentication assistance users with an account of the primary user;
storing, in a storage device, data associating the account of the primary user with the authentication assistance users;
receiving, via the communication module, a second request from the primary user to perform an operation, wherein the second request is received subsequent to storing the data associating the account of the primary user with the authentication assistance users;
determining, by a processor, a type of the operation in the second request;
in response to determining that the type is a first predetermined type of operation which requires approval from the authentication assistance users;
sending an authentication request to each of the authentication assistance users;
in response to receiving an approval response from a first subset of the authentication assistance users, wherein the first subset is a first percentage which is less than an entirety of the authentication assistance users and greater than a predetermined threshold, allowing the second request;
in response to detecting a lack of response from a first authentication assistance user within a predetermined period of time, counting the lack of response as receiving a denial response; and
in response to receiving a denial response from a second subset of the authentication assistance users, wherein the second subset is a second percentage which is less than the entirety of the authentication assistance users and less than or equal to the predetermined threshold, denying the second request,wherein prior to receiving the denial response from the second subset, the method further comprises;
receiving, by at least one second authentication assistance user of the second subset, the authentication request;
in response to the authentication request, providing, by the at least one second authentication assistance user, a reason for the denial; and
receiving, by the communication module, the reason for the denial provided by the at least one second authentication assistance user, andwherein subsequent to receiving the denial response from the second subset, the method further comprises;
displaying, on a device associated with the primary user, the reason for the denial provided by the at least one second authentication assistance user.
3 Assignments
0 Petitions
Accused Products
Abstract
A system is provided for facilitating multi-party authentication. During operation, the system receives, via a communication module, an operation request from a primary user. The system then sends an authentication request to the authentication assistance user and receives a response from the authentication assistance user. Subsequently, the system allows or denies the operation request based on the response received from the authentication assistance user.
-
Citations
22 Claims
-
1. An computer-implemented method for facilitating multi-party authentication, the method comprising:
-
receiving, via a communication module, a first request from a primary user to associate a plurality of authentication assistance users with an account of the primary user; storing, in a storage device, data associating the account of the primary user with the authentication assistance users; receiving, via the communication module, a second request from the primary user to perform an operation, wherein the second request is received subsequent to storing the data associating the account of the primary user with the authentication assistance users; determining, by a processor, a type of the operation in the second request; in response to determining that the type is a first predetermined type of operation which requires approval from the authentication assistance users; sending an authentication request to each of the authentication assistance users; in response to receiving an approval response from a first subset of the authentication assistance users, wherein the first subset is a first percentage which is less than an entirety of the authentication assistance users and greater than a predetermined threshold, allowing the second request; in response to detecting a lack of response from a first authentication assistance user within a predetermined period of time, counting the lack of response as receiving a denial response; and in response to receiving a denial response from a second subset of the authentication assistance users, wherein the second subset is a second percentage which is less than the entirety of the authentication assistance users and less than or equal to the predetermined threshold, denying the second request, wherein prior to receiving the denial response from the second subset, the method further comprises; receiving, by at least one second authentication assistance user of the second subset, the authentication request; in response to the authentication request, providing, by the at least one second authentication assistance user, a reason for the denial; and receiving, by the communication module, the reason for the denial provided by the at least one second authentication assistance user, and wherein subsequent to receiving the denial response from the second subset, the method further comprises; displaying, on a device associated with the primary user, the reason for the denial provided by the at least one second authentication assistance user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 19, 20, 21, 22)
-
-
8. A non-transitory storage medium storing instructions, which when executed by a processor cause the processor to perform a method for facilitating multi-party authentication, the method comprising:
-
receiving, via a communication module, a first request from a primary user to associate a plurality of authentication assistance users with an account of the primary user; storing, in a storage device, data associating the account of the primary user with the authentication assistance users; receiving, via the communication module, a second request from the primary user to perform an operation, wherein the second request is received subsequent to storing the data associating the account of the primary user with the authentication assistance users; determining, by the processor, a type of the operation in the second request; in response to determining that the type is a first predetermined type of operation which requires approval from the authentication assistance users; sending an authentication request to each of the authentication assistance users; in response to receiving an approval response from a first subset of the authentication assistance users, wherein the first subset is a first percentage which is less than an entirety of the authentication assistance users and greater than a predetermined threshold, allowing the second request; in response to detecting a lack of response from a first authentication assistance user within a predetermined period of time, counting the lack of response as receiving a denial response; and in response to receiving a denial response from a second subset of the authentication assistance users, wherein the second subset is a second percentage which is less than the entirety of the authentication assistance users and less than or equal to the predetermined threshold, denying the second request, wherein prior to receiving the denial response from the second subset, the method further comprises; receiving, by at least one second authentication assistance user of the second subset, the authentication request; in response to the authentication request, providing, by the at least one second authentication assistance user, a reason for the denial; and receiving, by the communication module, the reason for the denial provided by the at least one second authentication assistance user, and wherein subsequent to receiving the denial response from the second subset, the method further comprises; displaying, on a device associated with the primary user, the reason for the denial provided by the at least one second authentication assistance user. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer system for facilitating multi-party authentication, the computer system comprising:
-
a processor; a memory coupled to the processor and storing instructions, which when executed by the processor cause the processor to perform a method, the method comprising; receiving, via a communication module, a first request from a primary user to associate a plurality of authentication assistance users with an account of the primary user; storing, in a storage device, data associating the account of the primary user with the authentication assistance users; receiving, via the communication module, a second request from the primary user to perform an operation, wherein the second request is received subsequent to storing the data associating the account of the primary user with the authentication assistance users; determining, by the processor, a type of the operation in the second request; in response to determining that the type is a first predetermined type of operation which requires approval from the authentication assistance users; sending an authentication request to each of the authentication assistance users; in response to receiving an approval response from a first subset of the authentication assistance users, wherein the first subset is a first percentage which is less than an entirety of the authentication assistance users and greater than a predetermined threshold, allowing the second request; in response to detecting a lack of response from a first authentication assistance user within a predetermined period of time, counting the lack of response as receiving a denial response; and in response to receiving a denial response from a second subset of the authentication assistance users, wherein the second subset is a second percentage which is less than the entirety of the authentication assistance users and less than or equal to the predetermined threshold, denying the second request, wherein prior to receiving the denial response from the second subset, the method further comprises; receiving, by at least one second authentication assistance user of the second subset, the authentication request; in response to the authentication request, providing, by the at least one second authentication assistance user, a reason for the denial; and receiving, by the communication module, the reason for the denial provided by the at least one second authentication assistance user, and wherein subsequent to receiving the denial response from the second subset, the method further comprises; displaying, on a device associated with the primary user, the reason for the denial provided by the at least one second authentication assistance user. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification