APPARATUS AND METHOD FOR SYSTEM USER AUTHENTICATION
First Claim
1. An apparatus comprising:
- an input module that receives an authentication token during a user authentication session;
a counter module that increments a count of the number of authentication tokens received during the user authentication session in response to receiving the authentication token;
a security module thatdetermines whether the authentication token matches a valid authentication token for the user;
prompts the user for another authentication token in response to determining that the authentication token does not match the valid authentication token; and
provides the user simulated access to a computing or electronic system in response to determining that (i) the count of the number of authentication tokens received during the user authentication session is equal to one and (ii) the authentication token matches the valid authentication token; and
an access module that provides the user authentic access to the computing or electronic system in response to determining that (i) the count of the number of authentication tokens received during the user authentication session is greater than one and (ii) the authentication token matches the valid authentication token,wherein at least a portion of the input module, the counter module, the security module, and the access module comprise one or more of hardware and executable code, the executable code stored on one or more computer readable storage media.
5 Assignments
0 Petitions
Accused Products
Abstract
An apparatus for user authentication includes an input module that receives an authentication token, a counter module that increments a count of the number of authentication tokens received, a security module that determines whether the authentication token matches a valid authentication token for the user, prompts the user for another authentication token in response to determining that the authentication token does not match the valid authentication token, and provides the user simulated access to an electronic system in response to determining that (i) the count of the number of authentication tokens received is equal to one and (ii) the authentication token matches the valid authentication token, and an access module that provides the user authentic access to the electronic system in response to determining that (i) the count of the number of authentication tokens received is greater than one and (ii) the authentication token matches the valid authentication token.
-
Citations
20 Claims
-
1. An apparatus comprising:
-
an input module that receives an authentication token during a user authentication session; a counter module that increments a count of the number of authentication tokens received during the user authentication session in response to receiving the authentication token; a security module that determines whether the authentication token matches a valid authentication token for the user; prompts the user for another authentication token in response to determining that the authentication token does not match the valid authentication token; and provides the user simulated access to a computing or electronic system in response to determining that (i) the count of the number of authentication tokens received during the user authentication session is equal to one and (ii) the authentication token matches the valid authentication token; and an access module that provides the user authentic access to the computing or electronic system in response to determining that (i) the count of the number of authentication tokens received during the user authentication session is greater than one and (ii) the authentication token matches the valid authentication token, wherein at least a portion of the input module, the counter module, the security module, and the access module comprise one or more of hardware and executable code, the executable code stored on one or more computer readable storage media. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for system user authentication comprising:
-
receiving an authentication token during a user authentication session; incrementing a count of the number of authentication tokens received during the user authentication session in response to receiving the authentication token; determining whether the authentication token matches a valid authentication token for the user; prompting the user for another authentication token in response to determining that the authentication token does not match the valid authentication token; providing the user simulated access to a computing or electronic system in response to determining that (i) the count of the number of authentication tokens received during the user authentication session is equal to one and (ii) the authentication token matches the valid authentication token; and providing the user authentic access to the computing or electronic system in response to determining that (i) the count of the number of authentication tokens received during the user authentication session is greater than one and (ii) the authentication token matches the valid authentication token. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for system user authentication, the computer program product comprising a computer readable storage medium having program code embodied therein, the program code readable/executable by a processor to:
-
receive an authentication token during a user authentication session; increment a count of the number of authentication tokens received during the user authentication session in response to receiving the authentication token; determine whether the authentication token matches a valid authentication token for the user; prompt the user for another authentication token in response to determining that the authentication token does not match the valid authentication token; provide the user simulated access to a computing or electronic system in response to determining that (i) the count of the number of authentication tokens received during the user authentication session is equal to one and (ii) the authentication token matches the valid authentication token; and provide the user authentic access to the computing or electronic system in response to determining that (i) the count of the number of authentication tokens received during the user authentication session is greater than one and (ii) the authentication token matches the valid authentication token. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification