×

Authentication system and method

  • US 10,462,120 B2
  • Filed: 05/25/2017
  • Issued: 10/29/2019
  • Est. Priority Date: 05/25/2017
  • Status: Active Grant
First Claim
Patent Images

1. A computerized method comprising:

  • receiving at the processing component, a registration request from the end user;

    creating by the processing component a unique registration token;

    creating by the processing component a database record including an identifier for the end user and the unique registration token;

    providing by the processing component to a registration device a mechanism to access an authentication application for initiating registration of the registration device;

    receiving, through the authentication application, from the end user, the identifier for the end user and the unique registration token;

    collecting an identifier associated with the registration device;

    receiving from the registration device a public key, the public key forming a portion of a cryptographic key pair, the cryptographic key pair being created upon the end user authenticating to the registration device, wherein the registration device stores a private key of the cryptographic key pair;

    calculating by the processing component a device authentication weight;

    storing in a database by the processing component the public key and the device authentication weight;

    receiving at a processing component, from a requesting device operated by an end user, data describing a request to access a computer program;

    determining by the processing component whether an existing authentication session for the end user exists;

    in accordance with a determination that the existing authentication session for the end user does not exist, prompting the end user to authenticate to the processing component;

    in accordance with a determination that the existing authentication session for the end user exists, performing a risk assessment comprising a consideration of one or both of (i) one or more request characteristics associated with the request to access the computer program and (ii) one or more computer program access criteria;

    in accordance with a determination that the risk assessment is positive, providing the requesting device with access to the computer program;

    in accordance with a determination that the risk assessment is negative, prompting the end user to perform an authentication activity and, in response to receiving data indicating that the end user performed the authentication activity and the authentication activity is successful, establishing a new authentication session for the end user and providing the requesting device with access to the computer program.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×