MULTI FACTOR AUTHENTICATION
First Claim
1. A method to authenticate a resource access request, comprising:
- receiving, in an authentication server in a communication network, a primary authentication request transmitted from a user via a first communication channel;
processing the primary authentication request to determine whether the user is authorized to access one or more resources;
in response to a determination that the user is authorized to access one or more resources, initiating, in a network element, a secondary authentication request; and
transmitting the secondary authentication request from the network element to the user via a second communication channel, different from the first communication channel.
3 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a network element comprises one or more processors, and a memory module communicatively coupled to the processor. The memory module comprises logic instructions which, when executed by the processor, configure the processor to receive, via a first communication channel, a primary authentication request transmitted from a user from a first device, process the primary authentication request to determine whether the user is authorized to access one or more resources, in response to a determination that the user is authorized to access one or more resources, initiate, a secondary authentication request, and transmit the secondary authentication request from the network element to the user via a second communication channel, different from the first communication channel.
-
Citations
25 Claims
-
1. A method to authenticate a resource access request, comprising:
-
receiving, in an authentication server in a communication network, a primary authentication request transmitted from a user via a first communication channel; processing the primary authentication request to determine whether the user is authorized to access one or more resources; in response to a determination that the user is authorized to access one or more resources, initiating, in a network element, a secondary authentication request; and transmitting the secondary authentication request from the network element to the user via a second communication channel, different from the first communication channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A network element, comprising:
-
one or more processors; a memory module communicatively coupled to the processor and comprising logic instructions stored in a computer readable medium which, when executed by the processor, configure the processor to; receive, via a first communication channel, a primary authentication request transmitted from a user from a first device; process the primary authentication request to determine whether the user is authorized to access one or more resources; in response to a determination that the user is authorized to access one or more resources, initiate, a secondary authentication request; and transmit the secondary authentication request from the network element to the user via a second communication channel, different from the first communication channel. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program product comprising logic instructions stored in a computer readable medium which, when executed by the processor, configure the processor to:
-
receive, via a first communication channel, a primary authentication request transmitted from a user from a first device; process the primary authentication request to determine whether the user is authorized to access one or more resources; in response to a determination that the user is authorized to access one or more resources, initiate a secondary authentication request; and transmit the secondary authentication request to the user via a second communication channel, different from the first communication channel. - View Dependent Claims (22, 23, 24, 25)
-
Specification