Multiple Factor-Based User Identification and Authentication
First Claim
1. A method of authenticating the identity of a user to determine access to a system, comprising:
- providing a plurality of factor-based data instances corresponding to a user;
evaluating the factor-based data instances to determine if the user'"'"'s identity is authenticated;
restricting the user'"'"'s access to the system if the user'"'"'s identity is not authenticated; and
granting the user'"'"'s access to the system if the user'"'"'s identity is authenticated.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authenticating the identity of a user to determine access to a system includes providing a plurality of factor-based data instances corresponding to a user, evaluating the factor-based data instances to determine if the user'"'"'s identity is authenticated, and granting or restricting the user'"'"'s access to the system if the user'"'"'s identity is authenticated. More particularly, the method includes providing a modified data instance based on a second data instance, generating a key based on a first data instance, applying the key to the modified data instance to generate a recovered data instance, interrogating the recovered data instance against the second data instance to generate an authentication value as a result of a correspondence evaluation, and granting or restricting the user'"'"'s access to the system based at least in part on the validity of the authentication value.
28 Citations
13 Claims
-
1. A method of authenticating the identity of a user to determine access to a system, comprising:
-
providing a plurality of factor-based data instances corresponding to a user;
evaluating the factor-based data instances to determine if the user'"'"'s identity is authenticated;
restricting the user'"'"'s access to the system if the user'"'"'s identity is not authenticated; and
granting the user'"'"'s access to the system if the user'"'"'s identity is authenticated. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of authenticating the identity of a user to determine access to a system, comprising:
-
providing a plurality of factor-based data instances corresponding to a user, including at least one modified data instance based on a second data instance of the plurality of factor-based data instances;
generating a key based on a first data instance of the plurality of factor-based data instances;
applying the key to the at least one modified data instance to generate a recovered data instance;
interrogating the recovered data instance against the second data instance to generate an authentication value as a result of a correspondence evaluation;
restricting the user'"'"'s access to the system based at least in part on an invalid authentication value; and
granting the user'"'"'s access to the system based at least in part on a valid authentication value. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13-20. -20. (canceled)
Specification