SYSTEM AND METHOD FOR SECOND FACTOR AUTHENTICATION
1 Assignment
0 Petitions
Accused Products
Abstract
As individuals increasingly engage in different types of transactions they face a growing threat from, possibly among other things, identity theft, financial fraud, information misuse, etc. and the serious consequences or repercussions of same. Leveraging the ubiquitous nature of wireless devices and the popularity of (Short Message Service, Multimedia Message Service, etc.) messaging, an infrastructure that enhances the security of the different types of transactions within which a wireless device user may participate through a Second Factor Authentication facility. The infrastructure may optionally leverage the capabilities of a centrally-located Messaging Inter-Carrier Vendor.
-
Citations
19 Claims
-
1. (canceled)
-
2. A method for providing enhanced transaction security, comprising:
-
receiving, at a gateway, a request message from a third party, the request message comprising a plurality of data fields indicative of a transaction involving the third party and a mobile subscriber; performing request message processing including at least two of; determining aspects of the request message; obtaining information about the mobile subscriber; and identifying rules and configuration data, thereby generating at least a Second Factor Authentication (SFA) token; saving results of the processing in a repository, the results including at least the SFA token; generating a mobile subscriber notification message, the mobile subscriber notification message containing at least the SFA token; and generating a third party notification message, the third party notification message containing at least the SFA token. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for providing enhanced transaction security, comprising:
-
a gateway configured to receive a request message from a third party, the request message comprising a plurality of data fields indicative of a transaction involving the third party and a mobile subscriber; and at least one workflow module, the at least one workflow module configured to; perform request message processing including at least two of; determining aspects of the request message; obtaining information about the mobile subscriber; and identifying rules and configuration data, thereby generating at least a Second Factor Authentication (SFA) token; save the SFA token in a repository; generate a mobile subscriber notification message, the mobile subscriber notification containing at least the SFA token; and generate a third party notification message, the third party notification containing at least the SFA token. - View Dependent Claims (15, 16)
-
-
17. A computer-readable medium having stored thereon, computer-executable instructions that, if executed by computing device, cause the computing device to perform a method comprising:
-
receiving, at a gateway, a request message from a third party, the request message comprising a plurality of data fields indicative of a transaction involving the third party and a mobile subscriber; performing request message processing including at least two of; determining aspects of the request message; obtaining information about the mobile subscriber; and identifying rules and configuration data, thereby generating at least a Second Factor Authentication (SFA) token; saving results of the processing in a repository, the results including at least the SFA token; generating a mobile subscriber notification message, the mobile subscriber notification message containing at least the SFA token; and generating a third party notification message, the third party notification message containing at least the SFA token. - View Dependent Claims (18, 19)
-
Specification