TWO-FACTOR AUTHENTICATION METHODS AND SYSTEMS
First Claim
Patent Images
1. A method of providing secondary authentication of a user performing a transaction comprising:
- receiving a request for a secondary authentication from a target system that has received first authentication data;
identifying a user device associated with the user based on the request from the target system;
transmitting a notification to the user device;
receiving a confirmation or denial from the user device within a timeout interval; and
submitting an authorization to the target system if a confirmation is received from the user device, submitting a denial to the target system if a denial is received from the user device, or submitting a timeout signal to the target system if neither a confirmation or a denail is received from the user device within the timeout interval.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for two-factor authentication used to provide a user access to a target system. After receiving an initial login for a user, a notification is sent to a user device to confirm the transaction. The user may confirm or deny the transaction, alerting the user in real time of any possible fraudulent transactions.
52 Citations
23 Claims
-
1. A method of providing secondary authentication of a user performing a transaction comprising:
-
receiving a request for a secondary authentication from a target system that has received first authentication data; identifying a user device associated with the user based on the request from the target system; transmitting a notification to the user device; receiving a confirmation or denial from the user device within a timeout interval; and submitting an authorization to the target system if a confirmation is received from the user device, submitting a denial to the target system if a denial is received from the user device, or submitting a timeout signal to the target system if neither a confirmation or a denail is received from the user device within the timeout interval. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of providing secondary authentication of a user accessing a target system comprising:
-
receiving an access request including first authentication data into a target system; comparing the first authentication data to one or more records to find a match; identifying a user device associated with the user; transmitting a notification to the user device; receiving a confirmation or denial from the user device within a timeout interval; and permitting access to the user if a confirmation is received from the user device, denying access to the user if a denial is received from the user device, or initiating a timeout procedure if no response is received from the user device within the timeout interval. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A system providing secondary authentication of a user performing a transaction comprising:
-
a target system having a target server and a target database containing one or more target user records, the target system configured to receive an input from a user client and compare the input to the one or more target user records; and an authentication system having an authentication server and an authentication database containing one or more authentication user records and a user device associated with each user record, the authentication system configured to receive data from the target system, compare the data to the one or more authentication user records, submit a notification to a user device, and receive a communication from the user device. - View Dependent Claims (21, 22, 23)
-
Specification