×

Multifactor network authentication

  • US 10,462,665 B2
  • Filed: 08/17/2017
  • Issued: 10/29/2019
  • Est. Priority Date: 08/17/2017
  • Status: Active Grant
First Claim
Patent Images

1. A network authentication system, comprising:

  • an authentication server implemented in hardware, configured to;

    receive an authentication key request from a first user device associated with a first user, wherein the authentication key request identifies;

    an account linked with the first user; and

    a second user device associated with a second user;

    generate an authentication key in response to receiving the authentication key request;

    generate a first authentication key fragment comprising a first portion of the authentication key, wherein the first authentication key fragment is linked with a first set of authentication rules for the first user;

    generate a second authentication key fragment comprising a second portion of the authentication key, wherein the second authentication key fragment is linked with a second set of authentication rules for the second user;

    send the first authentication key fragment to the first user device;

    send the second authentication key fragment to the second user device;

    a server in signal communication with the authentication server, configured to;

    receive a request to perform an action by the second user on the account linked with the first user, wherein the request comprises the second authentication key fragment;

    send an authentication request comprising the second authentication key fragment to the authentication server in response to receiving the request; and

    executing the action on the account linked with first user in response to receiving an authentication approval from the authentication server; and

    the authentication server further configured to;

    interrogate the second user via the second user device using the second set of authentication rules to validate the second authentication key fragment in response to receiving the authentication request;

    send an approval request to the first user device in response to validating the second authentication key fragment;

    interrogate the first user via the first user device using the first set of authentication rules to validate the first authentication key fragment in response to receiving the first authentication key fragment from the first user device; and

    send an authentication approval to the server in response to validating the first authentication key fragment.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×