METHOD AND SYSTEM USING TWO OR MORE STORAGE DEVICES FOR AUTHENTICATING MULTIPLE USERS FOR A SINGLE TRANSACTION
First Claim
1. A method for using multiple storage devices for authenticating multiple users in regard to a single transaction, said method comprising:
- receiving data at a server, the data indicative of a first user attempting to access the server through a first interface operable with a first storage device;
receiving data at the server, the data indicative of a second user, having an association with the first user, attempting to access the server through a second interface operable with a second storage device;
producing, at the server, a hash value from a combination of the data indicative of the first user and the data indicative of the second user;
communicating, upon creation of the hash value, transaction counter values from each of the storage devices to the server;
initiating transaction based counters, at the server, based on the communicated counter values;
performing a transaction within the server based on data retrieved from at least the first storage device; and
iterating the transaction based counters upon completion of the transaction.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for using multiple storage devices for authenticating multiple users in regard to a single transaction is described. The method includes receiving data at a server, the data indicative of a first user attempting to access the server through a first interface operable with a first storage device, receiving data at the server, the data indicative of a second user, having an association with the first user, attempting to access the server through a second interface operable with a second storage device, producing, at the server, a hash value from a combination of the data indicative of the first user and the data indicative of the second user, communicating, upon creation of the hash value, transaction counter values from each of the storage devices to the server, initiating transaction based counters, at the server, based on the communicated counter values, performing a transaction within the server based on data retrieved from at least the first storage device, and iterating the transaction based counters upon completion of the transaction.
10 Citations
20 Claims
-
1. A method for using multiple storage devices for authenticating multiple users in regard to a single transaction, said method comprising:
-
receiving data at a server, the data indicative of a first user attempting to access the server through a first interface operable with a first storage device; receiving data at the server, the data indicative of a second user, having an association with the first user, attempting to access the server through a second interface operable with a second storage device; producing, at the server, a hash value from a combination of the data indicative of the first user and the data indicative of the second user; communicating, upon creation of the hash value, transaction counter values from each of the storage devices to the server; initiating transaction based counters, at the server, based on the communicated counter values; performing a transaction within the server based on data retrieved from at least the first storage device; and iterating the transaction based counters upon completion of the transaction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for authenticating multiple users in regard to a single transaction, said method comprising:
-
a first user device operable to interface with a first storage device associated with a first user; a second user device operable to interface with a second storage device associated with a second user; and a server communicatively coupled to said first user device and said second user device, said server programmed to; receive data from the first storage device via said first user device indicative of a first user attempting to access said server; receive data from the second storage device via said second user device indicative of a second user attempting to access said server; produce a hash value from a combination of the data received from the first storage device and the second storage device; receive transaction counter values from each of the storage devices via the respective said user devices; initiate transaction based counters based on the received counter values; perform a transaction based on further data retrieved from at least the first storage device; and iterate the transaction based counters upon completion of the transaction. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for authenticating users to a restricted transaction, said method comprising:
-
substantially simultaneously sending, via separate user interfaces, information from two separate storage devices to a server, the information sent from the first storage device associated with a first class of user, the information sent from the second storage device associated with a second class of user; producing, at the server, a combined hash value based on the information received from the storage devices; and based on the hash value, exchanging data between the server and the storage devices relating to a transaction initiated through one of the user interfaces. - View Dependent Claims (20)
-
Specification