Systems and Methods of User Authentication
First Claim
1. In a computer system, a method of authenticating an entity, the method comprising:
- receiving at a computer a request for authentication;
transmitting an authentication code for reception by a stand-alone device;
receiving at the computer a password derived from the authentication code; and
authenticating an entity based on the password.
1 Assignment
0 Petitions
Accused Products
Abstract
Various embodiments of the invention provide enhanced authentication solutions, including without limitation methods, systems and software programs for authenticating an entity and/or for facilitating such authentication. In accordance with certain embodiments, an entity (such as a user, a computer, etc.) attempts to authenticate in order to use a resource (such as a server, an application, etc.). Merely by way of example, the entity may provide a username or some other identifier to a computer responsible for authenticating the entity. In response, the authenticating computer may transmit a challenge, such as an authentication code. In particular embodiments, the challenge may be used to derive an authentication reply, which in turn may be used to derive and/or create a password (in one set of embodiments, the authentication reply itself may be the password). The derivation of the authentication reply may also require the user to provide some sort of identification, such as a personal information code (“PIC”), biometric verification, etc. The password then may be supplied to the authenticating computer, which can, in some cases, use the username and the password to authenticate the entity.
-
Citations
49 Claims
-
1. In a computer system, a method of authenticating an entity, the method comprising:
-
receiving at a computer a request for authentication;
transmitting an authentication code for reception by a stand-alone device;
receiving at the computer a password derived from the authentication code; and
authenticating an entity based on the password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. In a computer system, a method of authenticating an entity, the method comprising:
-
receiving at a first computer a request for authentication from a second computer;
based on the received request for authentication, transmitting an authentication code for reception by a stand-alone device;
receiving from the second computer a password derived from the authentication code; and
authenticating an entity based on the password.
-
-
20. In a computer system, a method of facilitating the authentication of an entity, the method comprising:
-
receiving at a stand-alone device an authentication code, wherein the authentication code is based on a request for authentication;
deriving from the authentication code an authentication reply; and
providing the authentication reply to an entity, wherein the authentication reply is used to derive a password for authenticating the entity on a computer system. - View Dependent Claims (21, 22, 23, 24)
-
-
25. In a computer system, a method of authenticating an entity, the method comprising:
-
receiving at a computer a request for authentication;
generating an authentication code related to the request for authentication;
transmitting the authentication code for reception by a stand-alone device;
receiving the authentication code with the stand-alone device;
deriving at the stand-alone device an authentication reply from the authentication code;
providing the authentication reply to an entity desiring authentication;
receiving at the computer a password derived from the authentication reply; and
authenticating an entity based on the password.
-
-
26. A system for authenticating a user, the system comprising:
-
a computer comprising a processor and instructions executable by the processor to;
receive a request for authentication; and
transmit an authentication code related to the request for authentication; and
a device configured to;
receive the authentication code;
derive an authentication reply from the authentication code; and
provide the authentication reply to a user, such that the user may use the authentication reply to authenticate with the computer. - View Dependent Claims (27, 28, 29, 30)
-
-
31. A system for authenticating a user, the system comprising:
-
a first computer comprising a processor and instructions executable by the processor to;
receive a request for authentication;
transmit an authentication code related to the request for authentication;
receive a password related to the request for authentication; and
authenticate a user;
a device configured to;
receive the authentication code;
derive an authentication reply from the authentication code; and
provide the authentication reply to a user; and
a second computer in communication with the first computer, the second computer comprising a second processor and instructions executable by the second processor to;
submit a request for authentication for reception by the first computer;
accept from the user a password derived from the authentication reply; and
submit the password for authentication by the first computer. - View Dependent Claims (32, 33)
-
-
34. A computer system for authenticating a user, the system comprising:
-
a processor; and
instructions executable by the processor to;
receive a request for authentication;
transmit an authentication code related to the request for authentication;
receive a password derived from the authentication code; and
authenticate an entity based on the received password.
-
-
35. A device for facilitating the authentication of a user by a computer system, the device comprising:
-
a processor; and
instructions executable by the processor to;
receive an authentication code;
derive from the authentication code an authentication reply; and
provide the authentication reply to a user, wherein a password derived from the authentication reply is used to authenticate the entity on a computer system. - View Dependent Claims (36, 37, 38)
-
-
39. A software program embodied on a computer readable medium, the software program comprising instructions executable by a computer to:
-
receive a request for authentication;
transmit an authentication code for reception by a stand-alone device;
receive a password derived from the authentication code; and
authenticate an entity based on the password.
-
-
40. A software application comprising:
-
a first software component embodied on a first computer readable medium, the first software component comprising instructions executable by a first computer to;
receive a request for authentication;
transmit an authentication code for reception by a stand-alone device;
receive a password derived from an authentication reply; and
authenticate an entity based on the password; and
a second software component embodied on a second computer readable medium, the second software component comprising instructions executable by a stand-alone device to;
receive the authentication code;
derive an authentication reply from the authentication code; and
provide the authentication reply to an entity desiring authentication. - View Dependent Claims (41, 42, 43, 44)
-
-
45. A software program embodied on a computer readable medium, the software program comprising instructions executable by a stand-alone device to:
-
receive an authentication code, wherein the authentication code is based on a request for authentication;
derive from the authentication code an authentication reply; and
provide the authentication reply to an entity, wherein the authentication reply is used to derive a password for authenticating the entity on a computer system.
-
-
46. A system for authenticating an entity, the system comprising.
means for receiving a request for authentication; -
means for transmitting an authentication code for reception by a stand-alone device;
means for receiving a password derived from the authentication code; and
means for authenticating an entity based on the password. - View Dependent Claims (47, 48)
-
-
49. A device for facilitating the authentication of an entity, the device comprising:
-
means for receiving an authentication code;
means for deriving an authentication reply from the authentication code; and
means for providing the authentication reply to an entity desiring authentication.
-
Specification