METHODS AND SYSTEMS FOR SECURE KEY ENTRY VIA COMMUNICATION NETWORKS
First Claim
1. A member authentication method, comprising:
- receiving, at a security server from a client server, a member authentication request associated with a member attempting to access confidential information from the client server via a first member device associated with the member;
determining at the security server a secure key associated with the member, wherein the secure key comprises an ordered sequence of symbols;
determining a one-time plurality of symbol sets associated with the secure key, wherein the ordered sequence of symbols is included within the plurality of symbol sets;
transmitting data associated with the secure key from the security server to an authentication device associated with the member, wherein the data associated with the secure key comprises a matrix having columns and rows, each column in the matrix representing one of the symbol sets, and further wherein said authentication device includes a display, said secure key information entered using a touch screen keypad on said display, wherein a matrix size of said matrix is selected by the security server based at least in part on a size of said display and said secure key information received from the second member device comprises one of;
(i) a sequence of matrix row selections entered by the member without including matrix column selections, or (ii) a sequence of matrix column selections entered by the member without including matrix row selections;
entering, by the member, secure key information into the authentication device;
receiving, at the security server from the authentication device, the secure key information;
validating the secure key information at the security server; and
based on the validated secure key information, authenticating the member;
responsive to said authentication, transmitting, by the client server, the confidential information from the client server to the first member device.
0 Assignments
0 Petitions
Accused Products
Abstract
According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be associated with, for example, a member attempting to access confidential information from the client server. A secure key associated with the member may be determined and data associated with that key may be transmitted to the member (e.g., via his or her wireless device or computer). Secure key information may be received from the member and validated. Based on the validated secure key information, it may be arranged for the member to receive the confidential information from the client server.
11 Citations
20 Claims
-
1. A member authentication method, comprising:
-
receiving, at a security server from a client server, a member authentication request associated with a member attempting to access confidential information from the client server via a first member device associated with the member; determining at the security server a secure key associated with the member, wherein the secure key comprises an ordered sequence of symbols; determining a one-time plurality of symbol sets associated with the secure key, wherein the ordered sequence of symbols is included within the plurality of symbol sets; transmitting data associated with the secure key from the security server to an authentication device associated with the member, wherein the data associated with the secure key comprises a matrix having columns and rows, each column in the matrix representing one of the symbol sets, and further wherein said authentication device includes a display, said secure key information entered using a touch screen keypad on said display, wherein a matrix size of said matrix is selected by the security server based at least in part on a size of said display and said secure key information received from the second member device comprises one of;
(i) a sequence of matrix row selections entered by the member without including matrix column selections, or (ii) a sequence of matrix column selections entered by the member without including matrix row selections;entering, by the member, secure key information into the authentication device; receiving, at the security server from the authentication device, the secure key information; validating the secure key information at the security server; and based on the validated secure key information, authenticating the member; responsive to said authentication, transmitting, by the client server, the confidential information from the client server to the first member device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A plurality of non-transient computer-readable medium storing instructions adapted to be executed by processors to perform a method, said method comprising:
-
receiving, at a security server from a client server, a member authentication request associated with a member attempting to access confidential information from the client server via a first member device associated with the member; determining at the security server a secure key associated with the member, wherein the secure key comprises an ordered sequence of symbols; determining a one-time plurality of symbol sets associated with the secure key, wherein the ordered sequence of symbols is included within the plurality of symbol sets; transmitting data associated with the secure key from the security server to an authentication device associated with the member, wherein the data associated with the secure key comprises a matrix having columns and rows, each column in the matrix representing one of the symbol sets, and further wherein said authentication device includes a display, said secure key information entered using a touch screen keypad on said display, wherein a matrix size of said matrix is selected by the security server based at least in part on a size of said display and said secure key information received from the second member device comprises one of;
(i) a sequence of matrix row selections entered by the member without including matrix column selections, or (ii) a sequence of matrix column selections entered by the member without including matrix row selections;entering, by the member, secure key information into the authentication device; receiving, at the security server from the authentication device, the secure key information; validating the secure key information at the security server; and based on the validated secure key information, authenticating the member; responsive to said authentication, transmitting, by the client server, the confidential information from the client server to the first member device. - View Dependent Claims (18, 19, 20)
-
Specification