DYNAMIC ACCOUNT AUTHENTICATION USING A MOBILE DEVICE
First Claim
Patent Images
1. A method for dynamic authentication of a user using a mobile device, comprising:
- receiving a request from the mobile device for authentication of the user using the mobile device, wherein the request includes information that uniquely identifies an account;
sending a first custom security challenge that is selected from custom security challenges, wherein the first custom security challenge and a first valid response to the first custom security challenge were previously established with the user and stored in association with the account;
receiving a first response to the security challenge from the mobile device; and
,validating the first response against the first valid response to authenticate the user.
3 Assignments
0 Petitions
Accused Products
Abstract
Providing dynamic authentication of a user requesting access to a system via a mobile device is disclosed. An account holder tailors a set of customized security challenges and responses. When a request for account authentication is received from a mobile device, the system conducts a multi-step user authentication process that includes dynamically selecting and prompting the user with the custom security challenges.
-
Citations
22 Claims
-
1. A method for dynamic authentication of a user using a mobile device, comprising:
-
receiving a request from the mobile device for authentication of the user using the mobile device, wherein the request includes information that uniquely identifies an account; sending a first custom security challenge that is selected from custom security challenges, wherein the first custom security challenge and a first valid response to the first custom security challenge were previously established with the user and stored in association with the account; receiving a first response to the security challenge from the mobile device; and
,validating the first response against the first valid response to authenticate the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A machine-readable medium having stored thereon a plurality of instructions for dynamic authentication of a user using a mobile device, the plurality of instructions when executed by a processor, cause the processor to perform the steps of:
-
receiving a request from the mobile device for authentication of the user using the mobile device, wherein the request includes information that uniquely identifies an account; sending a first custom security challenge that is selected from custom security challenges, wherein the first custom security challenge and a first valid response to the first custom security challenge were previously established with the user and stored in association with an account; receiving a first response to the security challenge from the mobile device; and
,validating the first response against the first valid response to authenticate the user.
-
-
21. A system for dynamic authentication of a user using a mobile device, comprising:
-
an authentication engine configured to; receive a request from the mobile device for authentication of the user using the mobile device, wherein the request includes information that uniquely identifies an account; send a custom security challenge that is selected from custom security challenges, wherein the custom security challenge and a valid response to the custom security challenge were previously established with the user and stored in association with the account; receive a response to the security challenge from the mobile device; and
,validate the response against the valid response; and a database containing custom security challenges and the valid response to each security challenge.
-
-
22. A method for dynamic authentication of a mobile device, comprising:
-
receiving a request from the mobile device, wherein the request includes information that uniquely identifies the mobile device or an account; sending a first custom security challenge that is selected from custom security challenges, wherein the first custom security challenge and a first valid response to the first custom security challenge were previously established with an account holder and stored in association with the account; receiving a first response to the security challenge from the mobile device; and
,validating the first response against the first valid response to authenticate the mobile device.
-
Specification