Mobile Security Fob
First Claim
Patent Images
1. A computer-implemented method of enrolling a mobile device for secondary multifactor authentication, the method comprising:
- receiving from a primary factor authentication device by one or more computer systems, a request to enroll a mobile device as a secondary factor authentication device;
generating by the one or more computers, a pairing instruction for the primary factor authentication device, which pairing instruction includes information that causes the primary factor authentication device to execute a pairing operation with the mobile device;
transmitting by the one or more computers, the pairing instruction to the primary factor authentication device; and
enrolling by the one or more computer systems the mobile device as a secondary factor authentication device for the primary factor authentication device.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method comprising: receiving, from a primary factor authentication device by one or more computer systems, a request to enroll a mobile device as a secondary factor authentication device; and
- enrolling by the one or more computer systems the mobile device as a first, secondary factor authentication device.
27 Citations
21 Claims
-
1. A computer-implemented method of enrolling a mobile device for secondary multifactor authentication, the method comprising:
-
receiving from a primary factor authentication device by one or more computer systems, a request to enroll a mobile device as a secondary factor authentication device; generating by the one or more computers, a pairing instruction for the primary factor authentication device, which pairing instruction includes information that causes the primary factor authentication device to execute a pairing operation with the mobile device; transmitting by the one or more computers, the pairing instruction to the primary factor authentication device; and enrolling by the one or more computer systems the mobile device as a secondary factor authentication device for the primary factor authentication device. - View Dependent Claims (2, 3, 4, 5, 6, 8, 9)
-
-
7. (canceled)
-
10. (canceled)
-
11. A computer program product tangibly stored on a computer readable storage device, the computer program product comprising instructions for causing a computer system to:
-
receive from a primary factor authentication device, a request to enroll a mobile device as a secondary factor authentication device; generate a pairing instruction for the primary factor authentication device, which pairing instruction includes information that causes the primary factor authentication device to execute a pairing operation with the mobile device; transmit the pairing instruction to the primary factor authentication device; and enroll the mobile device as a secondary factor authentication device for the primary factor authentication device. - View Dependent Claims (13, 14, 15, 16)
-
-
12. An apparatus comprising:
-
a processor; memory coupled to the processor; and a storage medium storing a computer program product for causing the processor to; receive from a primary factor authentication device, a request to enroll a mobile device as a secondary factor authentication device; generate a pairing instruction for the primary factor authentication device, which pairing instruction includes information that causes the primary factor authentication device to execute a pairing operation with the mobile device; transmit the pairing instruction to the primary factor authentication device; and enroll the mobile device as a secondary factor authentication device for the primary factor authentication device. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A system comprises:
-
a business processor computer system, comprising one or more processors and memory coupled to the processors; and a storage medium storing a computer program product for causing the business processor computer system to; receive from a primary factor authentication device, a request to enroll a mobile device as a secondary factor authentication device; generate a pairing instruction for the primary factor authentication device, which pairing instruction includes information that causes the primary factor authentication device to execute a pairing operation with the mobile device; transmit the pairing instruction to the primary factor authentication device; and enroll the mobile device as a secondary factor authentication device for the primary factor authentication device; and an authentication computer system, comprising one or more processors and memory coupled to the processors; and a storage medium storing a computer program product for causing the an authentication computer system to; receive a key code from the mobile device; validate that key code is a valid key code generated by the business processor computer system, by comparing the received key code to other key codes previously received from the business processor computer system; and store the device ID for mobile device and key in a data repository; and generate an association between the device ID and the key.
-
Specification