METHODS AND SYSTEMS FOR SECURE KEY ENTRY VIA COMMUNICATION NETWORKS
First Claim
1. A member authentication method, comprising:
- receiving, at a security server from a client server, a member authentication request associated with a member attempting to access confidential information from the client server;
determining at the security server a secure key associated with the member;
transmitting data associated with the secure key from the security server to the member;
receiving from the member secure key information;
validating the secure key information at the security server; and
based on the validated secure key information, arranging for the member to receive the confidential information from the client server.
2 Assignments
0 Petitions
Accused Products
Abstract
According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be associated with, for example, a member attempting to access confidential information from the client server. A secure key associated with the member may be determined and data associated with that key may be transmitted to the member (e.g., via his or her wireless device or computer). Secure key information may be received from the member and validated. Based on the validated secure key information, it may be arranged for the member to receive the confidential information from the client server.
63 Citations
21 Claims
-
1. A member authentication method, comprising:
-
receiving, at a security server from a client server, a member authentication request associated with a member attempting to access confidential information from the client server; determining at the security server a secure key associated with the member; transmitting data associated with the secure key from the security server to the member; receiving from the member secure key information; validating the secure key information at the security server; and based on the validated secure key information, arranging for the member to receive the confidential information from the client server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A mobile user device, comprising:
-
a communication device to receive and transmit information via a communication network; a processor coupled to the communication device; and a storage device in communication with said processor and storing instructions adapted to be executed by said processor to; receive from a user a sequence of selected symbols, the sequence of selected symbols including at least some corporate logos; validate the received sequence of selected symbols; and responsive to said validation, allow access to the mobile user device.
-
-
21. A computer-readable medium storing instructions adapted to be executed by a processor to perform a method, said method comprising:
-
receiving, at a security server from a client server, a member authentication request associated with a member attempting to access confidential information from the client server; determining at the security server a secure key associated with the member; transmitting matrix data associated with the secure key from the security server to the member; receiving from the member an ordered list of column or row identifiers associated with the matrix data; validating the ordered list of identifiers at the security server; and based on the validated ordered list of identifiers, arranging for the member to receive the confidential information from the client server.
-
Specification