Continual Peer Authentication
First Claim
Patent Images
1. A method comprising:
- presenting an authentication challenge to a first user who wishes to participate in a call;
admitting said first user to said call when said authentication challenge is met; and
generating during said call, after the admission of said first user, a signal that prompts a second user participating in said call to authenticate said first user.
20 Assignments
0 Petitions
Accused Products
Abstract
A method for orchestrating peer authentication during a call (e.g., a telephone call, a conference call between three or more parties, an instant messaging [IM] chat session, etc.) is disclosed. In particular, a user is first authenticated in order to participate in a call (e.g., via entering a password, etc.), and subsequently during the call the user may be peer authenticated. In accordance with the illustrative embodiment, a user who participates in a call might be prompted to authenticate another user on the call based on particular events or user behavior during the call.
-
Citations
20 Claims
-
1. A method comprising:
-
presenting an authentication challenge to a first user who wishes to participate in a call; admitting said first user to said call when said authentication challenge is met; and generating during said call, after the admission of said first user, a signal that prompts a second user participating in said call to authenticate said first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
presenting an authentication challenge to a first user who wishes to participate in a call; admitting said first user to said call at time t1 when said authentication challenge is met; and generating during said call, at time t2, a signal that prompts a second user participating in said call to authenticate said first user, wherein t2>
t1. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
presenting an authentication challenge to a first user who wishes to participate in a call; admitting said first user to said call at time t1 when said authentication challenge is met; generating during said call, at time t2, a first signal that prompts a second user participating in said call to authenticate said first user; and generating during said call, at time t3, a second signal that prompts a third user participating in said call to authenticate said first user, wherein t3>
t2>
t1. - View Dependent Claims (18, 19, 20)
-
Specification