User Provisioning With Multi-Factor Authentication
First Claim
1. A method for authenticating a user in a network, comprising:
- requesting from a network software client of a computing device a network software service on a service gateway;
initiating a call between a user phone and an IVR phone login system in response to the user phone and the computing device being within a coverage area of the service gateway;
identifying the user associated with a location within the coverage area of the service gateway as uniquely assigned to the computing device;
completing the collection of a first information received by the network software service from the computing device before asynchronously initiating the collection of a second information received from the IVR phone login system;
correlating the first information and the second information; and
when the first and second information match, allowing access by the computing device to services of the service gateway.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user in a network includes a network software client of a computing device requesting network software services from a service gateway. A call between a user phone and an IVR phone login system is initiated in response to the user phone and the computing device being within a coverage area of the service gateway. A location of a user uniquely assigned to the computing device is identified within the coverage area. A first information received in the network software services from the computing device is correlated with a second information received from the IVR phone login system. When the first and second information match, access by the computing device to services of the service gateway is allowed.
-
Citations
47 Claims
-
1. A method for authenticating a user in a network, comprising:
-
requesting from a network software client of a computing device a network software service on a service gateway; initiating a call between a user phone and an IVR phone login system in response to the user phone and the computing device being within a coverage area of the service gateway; identifying the user associated with a location within the coverage area of the service gateway as uniquely assigned to the computing device; completing the collection of a first information received by the network software service from the computing device before asynchronously initiating the collection of a second information received from the IVR phone login system; correlating the first information and the second information; and when the first and second information match, allowing access by the computing device to services of the service gateway. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An authentication system, comprising:
-
a computing device including a network software client configured to request a network software services; a gateway configured to host the network software services and further configured to redirect the network software client to request the network software services from the service gateway; a user phone; an IVR phone login system configured to support a call with the user phone when the user phone and the computing device is located within a coverage area of the service gateway as uniquely assigned to the computing device; and the service gateway and the IVR phone login system further configured to correlate a first information received in the network software services from the computing device and a second information received from the IVR phone login system and when the first and second information match, allowing access by the computing device to services of the service gateway. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A computer-readable medium having computer-executable instructions thereon for authenticating a user in a network, the computer-executable instructions for performing the acts of:
-
requesting from a network software client of a computing device a network software service on a service gateway; initiating a call between a user phone and an IVR phone login system in response to the user phone and the computing device being within a coverage area of the service gateway; identifying the user associated with a location within the coverage area of the service gateway as uniquely assigned to the computing device; completing the collection of a first information received by the network software service from the computing device before asynchronously initiating the collection of a second information received from the IVR phone login system; correlating the first information and the second information; and when the first and second information match, allowing access by the computing device to services of the service gateway. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
Specification