Person-to-person network architecture for secure authorization and approval
First Claim
Patent Images
1. A system for configuring and executing a secure communication network for authorizing access to safeguarded resources, the system comprising:
- a memory device; and
one or more processing devices operatively coupled to the memory device, wherein the one or more processing devices are configured to execute computer-readable program code to;
receive a request from a first user to grant a second user access to an account associated with the first user;
in response to receiving the request to grant the second user the access to the account associated with the first user, configure a secure dedicated communication channel between a computing device of the first user and a computing device of the second user;
transmit, via the secure dedicated communication channel, to the computing device of the second user, the request to grant the second user the access to the account associated with the first user;
receive, from the computing device of the second user, an acceptance of the request to grant the second user the access to the account associated with the first user;
in response to receiving the acceptance, transmit control signals configured to cause the computing device of the second user to display notification of an authentication challenge and a request for an input of an authentication challenge response, wherein the authentication challenge is configured to query memory of the computing device of the second user to retrieve data that identifies the second user and the input is authorization by the second user to query the memory of the computing device of the second user;
in response to the second user providing the input that authorizes querying of the memory of the computing device of the second user, receive, from the computing device of the second user, the authentication challenge response including the data that identifies the second user;
compare the received data that identifies the second user with authentication data of the second user stored in a database to determine that the received authentication challenge response is acceptable; and
in response to determining that the received authentication challenge response is acceptable, grant the second user with access rights to the account associated with the first user.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for configuring and executing a secure communication network for authorizing access to safeguarded resources is provided. In particular, the system uses person-to-person (P2P) authentication technology to securely transmit resources between users. In this way, an efficient way to for users to manage resources is provided.
65 Citations
20 Claims
-
1. A system for configuring and executing a secure communication network for authorizing access to safeguarded resources, the system comprising:
-
a memory device; and one or more processing devices operatively coupled to the memory device, wherein the one or more processing devices are configured to execute computer-readable program code to; receive a request from a first user to grant a second user access to an account associated with the first user; in response to receiving the request to grant the second user the access to the account associated with the first user, configure a secure dedicated communication channel between a computing device of the first user and a computing device of the second user; transmit, via the secure dedicated communication channel, to the computing device of the second user, the request to grant the second user the access to the account associated with the first user; receive, from the computing device of the second user, an acceptance of the request to grant the second user the access to the account associated with the first user; in response to receiving the acceptance, transmit control signals configured to cause the computing device of the second user to display notification of an authentication challenge and a request for an input of an authentication challenge response, wherein the authentication challenge is configured to query memory of the computing device of the second user to retrieve data that identifies the second user and the input is authorization by the second user to query the memory of the computing device of the second user; in response to the second user providing the input that authorizes querying of the memory of the computing device of the second user, receive, from the computing device of the second user, the authentication challenge response including the data that identifies the second user; compare the received data that identifies the second user with authentication data of the second user stored in a database to determine that the received authentication challenge response is acceptable; and in response to determining that the received authentication challenge response is acceptable, grant the second user with access rights to the account associated with the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for configuring and executing a secure communication network for authorizing access to safeguarded resources, the computer program product comprising at least one non-transitory computer readable medium comprising computer readable instructions, the instructions comprising instructions for:
-
receiving a request from a first user to grant a second user access to an account associated with the first user; in response to receiving the request to grant the second user the access to the account associated with the first user, configuring a secure dedicated communication channel between a computing device of the first user and a computing device of the second user; transmitting, via the secure dedicated communication channel, to the computing device of the second user, the request to grant the second user the access to the account associated with the first user; receiving, from the computing device of the second user, an acceptance of the request to grant the second user the access to the account associated with the first user; in response to receiving the acceptance, transmitting control signals configured to cause the computing device of the second user to display notification of an authentication challenge and a request for an input of an authentication challenge response, wherein the authentication challenge is configured to query memory of the computing device of the second user to retrieve data that identifies the second user and the input is authorization by the second user to query the memory of the computing device of the second user; in response to the second user providing the input that authorizes querying of the memory of the computing device of the second user, receiving, from the computing device of the second user, the authentication challenge response including the data that identifies the second user; comparing the received data that identifies the second user with authentication data of the second user stored in a database to determine that the received authentication challenge response is acceptable; and in response to determining that the received authentication challenge response is acceptable, granting the second user with access rights to the account associated with the first user. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer implemented method for configuring and executing a secure communication network for authorizing access to safeguarded resources, said computer implemented method comprising:
providing a computing system comprising a computer processing device and a non-transitory computer readable medium, where the computer readable medium comprises configured computer program instruction code, such that when said instruction code is operated by said computer processing device, said computer processing device performs the following operations; receiving a request from a first user to grant a second user access to an account associated with the first user; in response to receiving the request to grant the second user the access to the account associated with the first user, configuring a secure dedicated communication channel between a computing device of the first user and a computing device of the second user; transmitting, via the secure dedicated communication channel, to the computing device of the second user, the request to grant the second user the access to the account associated with the first user; receiving, from the computing device of the second user, an acceptance of the request to grant the second user the access to the account associated with the first user; in response to receiving the acceptance, transmitting control signals configured to cause the computing device of the second user to display notification of an authentication challenge and a request for an input of an authentication challenge response, wherein the authentication challenge is configured to query memory of the computing device of the second user to retrieve data that identifies the second user and the input is authorization by the second user to query the memory of the computing device of the second user; in response to the second user providing the input that authorizes querying of the memory of the computing device of the second user, receiving, from the computing device of the second user, the authentication challenge response including the data that identifies the second user; comparing the received data that identifies the second user with authentication data of the second user stored in a database to determine that the received authentication challenge response is acceptable; and in response to determining that the received authentication challenge response is acceptable, granting the second user with access rights to the account associated with the first user. - View Dependent Claims (16, 17, 18, 19, 20)
Specification