SYSTEM AND METHOD FOR SECOND FACTOR AUTHENTICATION SERVICES
First Claim
Patent Images
1. A method for selectively granting a user access to data, comprising:
- at a first authentication server provided by a first vendor, receiving a request for access from a user computer,using signals from the user computer, providing first factor authentication of the user,only if first factor authentication is successful, using a second factor authentication engine provided by a second vendor different from the first vendor to provide second factor authentication of the user; and
only if second factor authentication is successful, granting the user access to the data.
1 Assignment
0 Petitions
Accused Products
Abstract
A customer server receives a client request to access protected resources over the Internet. First factor authentication is performed and if it is successful a vendor authentication engine is invoked to undertake second factor authentication. The results of the second factor authentication are returned to the customer server, which grants access only if both first and second factor authentication succeeds.
171 Citations
11 Claims
-
1. A method for selectively granting a user access to data, comprising:
-
at a first authentication server provided by a first vendor, receiving a request for access from a user computer, using signals from the user computer, providing first factor authentication of the user, only if first factor authentication is successful, using a second factor authentication engine provided by a second vendor different from the first vendor to provide second factor authentication of the user; and only if second factor authentication is successful, granting the user access to the data. - View Dependent Claims (2, 3, 9)
-
-
4. A second factor authentication engine on a tangible computer readable medium executable by a processor to execute logic comprising:
-
receive from a customer'"'"'s system an indication that a user name of a user and an associated password have been verified; undertaking second factor authentication of the user on behalf of the customer, and at least some of the time returning to the customer system an indication of results of second factor authentication. - View Dependent Claims (5, 10)
-
-
6. A server comprising:
-
at least one processor; at least one tangible computer readable medium accessible by the processor and bearing instructions embodying logic comprising; receiving a user request to access information; in response to the request, causing a user name and password received from the user to be authenticated; if the user name and password are not authenticated, denying the user access to the information; wherein only if the user name and password are authenticated, a vendor authentication engine undertakes a second factor authentication and generates a result; receiving the result from the engine; if the result indicates that second factor authentication fails, denying the user access to the information, otherwise granting the user access to the information. - View Dependent Claims (7, 8, 11)
-
Specification