AUTHORIZING SECURE RESOURCES
First Claim
Patent Images
1. A method, comprising:
- receiving a request to access a secure resource and a verification telephone number from a first device;
establishing a secure session with a second device associated with the verification telephone number;
requesting an authentication mechanism from the second device to verify the secure resource request;
verifying the received authentication mechanism if the requested authentication mechanism is received from the second device; and
determining whether to grant or deny the first device access to the secure resource based on the verification of the received authentication mechanism.
1 Assignment
0 Petitions
Accused Products
Abstract
A system receives a request to access a secure resource and a verification telephone number from a first device, establishes a secure session with a second device associated with the verification telephone number, requests an authentication mechanism from the second device to verify the secure resource request, verifies the received authentication mechanism if the requested authentication mechanism is received from the second device, and determines whether to grant or deny the first device access to the secure resource based on the verification of the received authentication mechanism.
52 Citations
27 Claims
-
1. A method, comprising:
-
receiving a request to access a secure resource and a verification telephone number from a first device; establishing a secure session with a second device associated with the verification telephone number; requesting an authentication mechanism from the second device to verify the secure resource request; verifying the received authentication mechanism if the requested authentication mechanism is received from the second device; and determining whether to grant or deny the first device access to the secure resource based on the verification of the received authentication mechanism. - View Dependent Claims (2, 3, 4)
-
-
5. A method, comprising:
-
receiving a request to use a secure resource; determining a device associated with the secure resource; establishing a secure session with the device associated with the secure resource; requesting approval of the secure resource request from the device; verifying the approval if the approval of the secure resource request is received from the device; and determining whether to grant or deny the first device use of the secure resource based on the verification of the approval. - View Dependent Claims (6, 7, 8)
-
-
9. A method implemented within a first device, comprising:
-
receiving a Short Message Service (SMS) signal that includes an address for establishing a secure session to authenticate a request to access a secure resource by a second device; establishing the secure session based on the address; receiving a request for an authentication mechanism to authenticate the secure resource request; and providing the requested authentication mechanism if the secure resource request is to be authenticated. - View Dependent Claims (10, 11)
-
-
12. A method implemented within a first device, comprising:
-
receiving a Short Message Service (SMS) signal that includes an address for establishing a secure session to approve a request to use a secure resource by a second device; establishing the secure session based on the address; receiving a request for approval of the secure resource request; and providing the requested approval if the secure resource request is to be approved. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method implemented within a first device, comprising:
-
requesting access to or use of a secure resource; providing a verification telephone number identifying a second device, the second device authenticating the first device for access to or use of the secure resource; and receiving access to or use of the secure resource based on the authentication provided by the second device.
-
-
18. A system, comprising:
-
means for receiving a request to access a secure resource from a first device; means for establishing a secure session, via a Short Message Service (SMS) signal, with a second, different device to authorize access to the secure resource; means for requesting approval of the secure resource request from the second device; means for verifying the approval if the approval of the secure resource request is received from the second device; and means for determining whether to grant or deny the first device access to the secure resource based on the verification of the approval. - View Dependent Claims (19, 20)
-
-
21. A system, comprising:
-
means for receiving a Short Message Service (SMS) signal that includes an address for establishing a secure session to authenticate a request to access a secure resource by a second device; means for establishing the secure session based on the address; means for receiving a request for approval of the secure resource request; and means for providing the requested approval if the secure resource request is to be approved. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A device, comprising:
-
a memory to store a plurality of instructions; and a processor to execute instructions in the memory to; receive a request to access a secure resource from a first device, establish a secure session, via a Short Message Service (SMS) signal, with a second, different device to authorize access to the secure resource, request approval of the secure resource request from the second device, verify the approval if the approval of the secure resource request is received from the second device, and determine whether to grant or deny the first device access to the secure resource based on the verification of the approval.
-
-
27. A device, comprising:
-
a memory to store a plurality of instructions; and processing logic to execute instructions in the memory to; receive a Short Message Service (SMS) signal that includes an address for establishing a secure session to authenticate a request to access a secure resource by a second device, establish the secure session based on the address, receive a request for approval of the secure resource request, and provide the requested approval if the secure resource request is to be approved.
-
Specification