×

Person-to-person network architecture for secure authorization and approval

  • US 10,454,941 B2
  • Filed: 05/05/2017
  • Issued: 10/22/2019
  • Est. Priority Date: 05/05/2017
  • Status: Active Grant
First Claim
Patent Images

1. A system for configuring and executing a secure communication network for authorizing access to safeguarded resources, the system comprising:

  • a memory device; and

    one or more processing devices operatively coupled to the memory device, wherein the one or more processing devices are configured to execute computer-readable program code to;

    receive a request from a first user to grant a second user access to an account associated with the first user;

    in response to receiving the request to grant the second user the access to the account associated with the first user, configure a secure dedicated communication channel between a computing device of the first user and a computing device of the second user;

    transmit, via the secure dedicated communication channel, to the computing device of the second user, the request to grant the second user the access to the account associated with the first user;

    receive, from the computing device of the second user, an acceptance of the request to grant the second user the access to the account associated with the first user;

    in response to receiving the acceptance, transmit control signals configured to cause the computing device of the second user to display notification of an authentication challenge and a request for an input of an authentication challenge response, wherein the authentication challenge is configured to query memory of the computing device of the second user to retrieve data that identifies the second user and the input is authorization by the second user to query the memory of the computing device of the second user;

    in response to the second user providing the input that authorizes querying of the memory of the computing device of the second user, receive, from the computing device of the second user, the authentication challenge response including the data that identifies the second user;

    compare the received data that identifies the second user with authentication data of the second user stored in a database to determine that the received authentication challenge response is acceptable; and

    in response to determining that the received authentication challenge response is acceptable, grant the second user with access rights to the account associated with the first user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×