×

Multi-factor authentication devices

  • US 10,360,367 B1
  • Filed: 06/07/2018
  • Issued: 07/23/2019
  • Est. Priority Date: 06/07/2018
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving, by a processor, a first request from a first user device to access a protected device,the first request including user credentials, andthe user credentials being associated with a user identity associated with the first user device;

    verifying, by the processor, the user identity based on comparing the user credentials received in the first request and a user profile;

    determining, by the processor, that an authentication code is needed to authenticate the first request to access the protected device based on verifying the user identity;

    dynamically generating, by the processor, a plurality of codes based on determining that the authentication code is needed to authenticate the first request to access the protected device,a first code, of the plurality of codes, corresponding to a correct authentication code needed to authenticate the first request to access the protected device,the first code being generated using a first pseudo-random code based on user-specific data,one or more second codes, of the plurality of codes, corresponding to one or more decoy codes, andthe one or more second codes being generated using one or more second pseudo-random codes;

    determining, by the processor, a second user device associated with the user identity after verifying the user identity;

    transmitting, by the processor, the plurality of codes to the second user device;

    transmitting, by the processor, a message including an instruction for identifying the correct authentication code from among the plurality of codes using the user-specific data;

    transmitting, by the processor and to the first user device, an authentication request that includes a second request for the correct authentication code,the correct authentication code to be identified, based on the authentication request, using the instruction;

    receiving, by the processor and from the first user device, a response to the authentication request that includes a third code;

    comparing, by the processor, the third code and the plurality of codes;

    determining, by the processor and based on the third code matching one of the one or more second codes, that the second user device is compromised;

    notifying, by the processor and based on determining that the second user device is compromised, a provider associated with the protected device that the second user device is compromised; and

    requesting, by the processor and based on determining that the second user device is compromised, an additional factor for authenticating the user identity.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×