METHODS AND SYSTEMS FOR USER AUTHENTICATION
First Claim
Patent Images
1. A method of authenticating a user over a network, comprising:
- receiving over the network at an authentication system coupled to at least one network a login request from a user;
generating an electronic readable identifier which includes at least in part a first session identifier associated with the user login request;
causing at least in part the electronic readable identifier to be displayed on a terminal associated with the user;
determining a destination to transmit a phone identifier associated with the user and the first identifier to;
transmitting the first session identifier and the phone identifier to the destination;
receiving from a mobile device information obtained from the electronic readable identifier;
comparing the phone identifier with stored phone identifiers; and
enabling the user login associated with the first session identifier if the phone identifier corresponds to a stored phone identifier.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to authentication, and in particular, to methods and systems for authenticating a user using electronic readable identifiers, networks, and data terminals. The user experience in accessing private accounts is enhanced while keeping such access secure from unauthorized individuals.
102 Citations
21 Claims
-
1. A method of authenticating a user over a network, comprising:
-
receiving over the network at an authentication system coupled to at least one network a login request from a user; generating an electronic readable identifier which includes at least in part a first session identifier associated with the user login request; causing at least in part the electronic readable identifier to be displayed on a terminal associated with the user; determining a destination to transmit a phone identifier associated with the user and the first identifier to; transmitting the first session identifier and the phone identifier to the destination; receiving from a mobile device information obtained from the electronic readable identifier; comparing the phone identifier with stored phone identifiers; and enabling the user login associated with the first session identifier if the phone identifier corresponds to a stored phone identifier. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of authenticating a user over a network, comprising:
-
receiving an indication that a user wants to login; generating an electronic readable identifier which includes at least in part a first identifier associated with the user login indication; causing at least in part the electronic readable identifier to be displayed on a terminal associated with the user; receiving over the network the first identifier and a phone identifier of the user; and enabling the user to login at least partly in response to a determination that the phone identifier corresponds to a stored phone identifier. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A method of authenticating a user over a network, comprising:
-
receiving an indication that a user wants to login; receiving a customer identifier; generating an electronic readable identifier; causing at least in part the electronic readable identifier to be displayed on a terminal associated with the user; receiving over a network a phone identifier associated with the user; and enabling the user login at least partly in response to a determination that the phone identifier corresponds to a stored phone identifier. - View Dependent Claims (14)
-
-
15. A method of authenticating a user over a network, comprising:
-
storing a password in a computer readable medium; receiving an indication of a login request from a user; generating an electronic readable identifier which includes at least in part a first identifier associated with the user login indication; at least partly enabling the display of the electronic readable identifier on a terminal associated with the user; receiving over a network the first identifier, the password, and a phone identifier associated with the user; and enabling the user login if the phone identifier corresponds to a stored phone identifier and if the password corresponds to a stored password. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification