METHOD FOR MOBILE SECURITY CONTEXT AUTHENTICATION
First Claim
Patent Images
1. A computer-based method for authenticating a user across a network, the steps comprising:
- providing a host, a server, a presentation, and a device;
wherein said device includes one or more applications;
wherein said server includes a profile algorithm;
requesting an access to said host by a main user at said presentation over a user channel;
requesting said server to perform a context verification decision by said host over a host channel;
creating two or more template objects by said profile algorithm of said server;
wherein said two or more template objects are a first template and a second template;
sending an object to said host over said host channel by said server;
presenting said object to said device at said presentation and over said user channel by said host;
processing said first template by said server;
wherein said processing step of said first template is based upon one or more contextual factors;
populating said first template by said server;
creating and storing a first signature by said server;
wherein said creating step of said first signature is based upon said processing step of said first template;
consuming said object by said main user on said device through said one or more applications;
requesting said second template on said server over a smart channel by said one or more applications;
sending said second template to said one or more applications on said device over said smart channel by said server;
processing said second template by said one or more applications;
populating said second template by said one or more applications;
creating and storing a second signature by said one or more applications;
wherein said creating step of said second signature is based upon said second template; and
performing said context verification decision when comparing said first signature and said second signature over said smart channel.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention is a system and a method for improving the authentication security across a network from a mobile electronic computing device in the context of one or more users, devices, sites/sessions, servers, locations, proximity, motion and/or behavioral attributes within a defined session lifecycle. The authentication method and system utilizes a strong, elegant, private, definitive and real-time, triangulated verification, which requires mutual authentication between the parties.
-
Citations
20 Claims
-
1. A computer-based method for authenticating a user across a network, the steps comprising:
-
providing a host, a server, a presentation, and a device; wherein said device includes one or more applications; wherein said server includes a profile algorithm; requesting an access to said host by a main user at said presentation over a user channel; requesting said server to perform a context verification decision by said host over a host channel; creating two or more template objects by said profile algorithm of said server; wherein said two or more template objects are a first template and a second template; sending an object to said host over said host channel by said server; presenting said object to said device at said presentation and over said user channel by said host; processing said first template by said server; wherein said processing step of said first template is based upon one or more contextual factors; populating said first template by said server; creating and storing a first signature by said server; wherein said creating step of said first signature is based upon said processing step of said first template; consuming said object by said main user on said device through said one or more applications; requesting said second template on said server over a smart channel by said one or more applications; sending said second template to said one or more applications on said device over said smart channel by said server; processing said second template by said one or more applications; populating said second template by said one or more applications; creating and storing a second signature by said one or more applications; wherein said creating step of said second signature is based upon said second template; and performing said context verification decision when comparing said first signature and said second signature over said smart channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-based method for authenticating a user across a network, the steps comprising:
-
providing a host, a server, a presentation, and a device; wherein said device includes one or more applications; wherein said server includes a profile algorithm; requesting an access to said host by a main user at said presentation over a user channel; requesting said server to perform a context verification decision by said host over a host channel; creating a first template and a second template by said profile algorithm of said server; sending an object to said host over said host channel by said server; presenting said object to said device at said presentation and over said user channel by said host; processing said first template by said server; wherein said processing step of said first template is based upon a first set of one or more contextual factors; populating said first template by said server; creating and storing a first signature by said server; wherein said creating step of said first signature is based upon said processing step of said first template; consuming said object by said main user on said device through said one or more applications; requesting said second template of said server over a smart channel by said one or more applications; sending said second template to said one or more applications on said device over said smart channel by said server; processing said second template by said one or more applications; populating said second template by said one or more applications; creating and storing a second signature by said one or more applications; wherein said creating step of said second signature is based upon said second template; performing said context verification decision when comparing said first signature and said second signature over said smart channel; and authenticating said device when said first signature is essentially identical to said second signature. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-based method for authenticating a user across a network, the steps comprising:
-
providing a host, a server, a presentation, and a device; wherein said device includes one or more applications; wherein said server includes a profile algorithm; requesting an access to said host by a main user at said presentation over a user channel; requesting said server to perform a context verification decision by said host over a host channel; creating a first template and a second template by said profile algorithm of said server; sending an object to said host over said host channel by said server; presenting said object to said device at said presentation and over said user channel by said host; processing said first template by said server; wherein said processing step of said first template is based upon one or more contextual factors; populating said first template by said server; creating and storing a first signature by said server; wherein said creating step of said first signature is based upon said processing step of said first template; wherein said creating and storing step of said first signature is based upon said consuming step of said object; consuming said object by said main user on said device through said one or more applications; requesting said second template of said server over a smart channel by said one or more applications; sending said second template to said one or more applications on said device over said smart channel by said server; processing said second template by said one or more applications; wherein said processing step of said second template is based upon of one or more contextual factors; populating said second template by said one or more applications; creating and storing a second signature by said one or more applications; deleting said one or more contextual factors by said server; wherein said creating step of said second signature is based upon said second template; performing said context verification decision when comparing said first signature and said second signature over said smart channel by said server and said one or more applications; and authenticating said device when said first signature is essentially identical to said second signature.
-
Specification