System and method for authenticating users
DCFirst Claim
1. A system for authenticating a user, comprising:
- a computing device configured by an application running on a processing unit of the computing device to generate a secret in response to the computing device receiving a unique user input, and to store said secret at the computing device along with an identifier so as to be retrievable when said unique user input is again provided by the user of the computing device;
a remote computer-based station configured to send the computing device a first communication, said first communication including said identifier associated with the secret,wherein the computing device is further configured by the application running on the computing device to (i) prompt the user of the computing device for said unique user input, (ii) verify said unique user input in response to receiving said unique user input, and (iii) in response to verifying said unique user input, transmit to the remote computer-based station a second communication encoded using the secret, and the remote computer-based station is further configured to receive and process the second communication to authenticate the user.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
A security application for a computing device, e.g., a mobile phone, allows generation of a secret according to a unique user input (e.g., user credentials). The secret is stored in a directory such that it is retrievable when the unique user input is received via a user interface of a device on which the security application executes or is coupled with. Responsive to receiving an identifier associated with the secret, the security application prompts, e.g., via a user interface of the mobile phone, entry of the unique user input; and, subsequently, verifies the unique user input. Following such verification, the security application provides the secret for use in encoding a communication with a remote computer-based station. Entry of the user credentials may be required prior to the security application generating the secret, and may be responsive to receipt of an invitation (e.g., from the remote computer-based station) to generate it.
67 Citations
14 Claims
-
1. A system for authenticating a user, comprising:
-
a computing device configured by an application running on a processing unit of the computing device to generate a secret in response to the computing device receiving a unique user input, and to store said secret at the computing device along with an identifier so as to be retrievable when said unique user input is again provided by the user of the computing device; a remote computer-based station configured to send the computing device a first communication, said first communication including said identifier associated with the secret, wherein the computing device is further configured by the application running on the computing device to (i) prompt the user of the computing device for said unique user input, (ii) verify said unique user input in response to receiving said unique user input, and (iii) in response to verifying said unique user input, transmit to the remote computer-based station a second communication encoded using the secret, and the remote computer-based station is further configured to receive and process the second communication to authenticate the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A remote computer-based station, comprising:
a processor and a memory communicatively coupled to the processor, the memory storing an identifier received from a mobile device, and further storing instructions for execution by the processor, which instructions when executed by the processor cause the processor to performing steps including; sending a first communication to the mobile device that includes the identifier, receiving a second communication from the mobile device that is encoded using a secret that was generated according to a unique user input by an application running on the mobile device, said secret associated with the identifier; attempting to process the second communication by decoding it using security parameters associated with the identifier; authenticating the mobile device if the second communication is able to be decoded; and denying authentication to the mobile device if the second communication is not able to be decoded.
Specification