User Provisioning With Multi-Factor Authentication
First Claim
1. A method for authenticating a user in a network, comprising:
- requesting from a network software client of a computing device a network software service on a service gateway;
initiating a call between a user phone and an IVR phone login system in response to the user phone and the computing device being within a coverage area of the service gateway;
identifying the user associated with a location within the coverage area of the service gateway as uniquely assigned to the computing device;
completing the collection of a first information received by the network software service from the computing device before asynchronously initiating the collection of a second information received from the IVR phone login system;
correlating the first information and the second information; and
when the first and second information match, allowing access by the computing device to services of the service gateway.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user in a network includes a network software client of a computing device requesting network software services from a service gateway. A call between a user phone and an IVR phone login system is initiated in response to the user phone and the computing device being within a coverage area of the service gateway. A location of a user uniquely assigned to the computing device is identified within the coverage area. A first information received in the network software services from the computing device is correlated with a second information received from the IVR phone login system. When the first and second information match, access by the computing device to services of the service gateway is allowed.
107 Citations
47 Claims
-
1. A method for authenticating a user in a network, comprising:
-
requesting from a network software client of a computing device a network software service on a service gateway; initiating a call between a user phone and an IVR phone login system in response to the user phone and the computing device being within a coverage area of the service gateway; identifying the user associated with a location within the coverage area of the service gateway as uniquely assigned to the computing device; completing the collection of a first information received by the network software service from the computing device before asynchronously initiating the collection of a second information received from the IVR phone login system; correlating the first information and the second information; and when the first and second information match, allowing access by the computing device to services of the service gateway. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An authentication system, comprising:
-
a computing device including a network software client configured to request a network software services; a gateway configured to host the network software services and further configured to redirect the network software client to request the network software services from the service gateway; a user phone; an IVR phone login system configured to support a call with the user phone when the user phone and the computing device is located within a coverage area of the service gateway as uniquely assigned to the computing device; and the service gateway and the IVR phone login system further configured to correlate a first information received in the network software services from the computing device and a second information received from the IVR phone login system and when the first and second information match, allowing access by the computing device to services of the service gateway. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A computer-readable medium having computer-executable instructions thereon for authenticating a user in a network, the computer-executable instructions for performing the acts of:
-
requesting from a network software client of a computing device a network software service on a service gateway; initiating a call between a user phone and an IVR phone login system in response to the user phone and the computing device being within a coverage area of the service gateway; identifying the user associated with a location within the coverage area of the service gateway as uniquely assigned to the computing device; completing the collection of a first information received by the network software service from the computing device before asynchronously initiating the collection of a second information received from the IVR phone login system; correlating the first information and the second information; and when the first and second information match, allowing access by the computing device to services of the service gateway. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
Specification