System and method for highly reliable multi-factor authentication
First Claim
1. A system that authenticates a user comprising a computer that receives a first factor and a third factor that are sent by said user using a first communication service and a second communication service, respectively, wherein said computer comprises a program that (a) generates a second factor, (b) validates said first and third factors, (c) then causes said second factor to be sent to said user using said second communication service and (d) after receipt of said second factor sent by said user, using said first communication service authenticates said user by validating said second factor.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for authenticating an online user by using different and independent communication services to enhance security. A key server validates the factors of authentication, namely a first factor (username/password) and a second factor (key). The key server generates and sends the key to the user with a different and independent communication service, e.g., telephone, SMS or email. The user then submits the key using the online communication service. A third factor, e.g., a second password or a biometric symbol of the user, can also be used. Validation of the biometric symbol can be a prerequisite to delivery of the key to the user. A plurality of the independent services can be daisy-chained.
-
Citations
28 Claims
- 1. A system that authenticates a user comprising a computer that receives a first factor and a third factor that are sent by said user using a first communication service and a second communication service, respectively, wherein said computer comprises a program that (a) generates a second factor, (b) validates said first and third factors, (c) then causes said second factor to be sent to said user using said second communication service and (d) after receipt of said second factor sent by said user, using said first communication service authenticates said user by validating said second factor.
-
10. A method that authenticates a user comprising:
-
using a computer to perform the steps of;
receiving a first factor and a third factor that are sent by said user using a first communication service and a second communication service, respectively;
generating a second factor;
validating said first and third factors;
then causing said second factor to be sent to said user using said second communication service; and
after receipt of said second factor sent by said user using said first communication service, authenticating said user by validating said second factor. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
- 19. A system comprising a computer that validates a user of an online service using a first factor and a second factor, wherein said computer sends said second factor to said user using an order of communication services other than said online service for delivery of said second factor to said user, wherein if there is a failure of delivery in a first communication service used in said order, said computer sends said second factor to said user using one of said communication services that is second in said order.
-
24. A method of authenticating a user of an online service by using a computer to perform steps comprising:
-
validating said user using a first factor and a second factor, sending said second factor to said user using an order of communication services other than said online service for delivery of said second factor to said user; and
if there is a failure of delivery in a first communication service used in said order, sending said key to said user using one of said communication services that is second in said order. - View Dependent Claims (25, 26, 27, 28)
-
Specification