DUAL CHANNEL IDENTITY AUTHENTICATION
First Claim
1. A method, comprising:
- determining, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user;
identifying a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user;
generating validation information to authenticate identity of the source user;
sending the validation information to a second device operated by the target user;
receiving a validation response from the first device operated by the source user; and
performing identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device.
3 Assignments
0 Petitions
Accused Products
Abstract
Identity authentication comprises: determining, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identifying a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generating validation information to authenticate identity of the source user; sending the validation information to a second device operated by the target user; receiving a validation response from the first device operated by the source user; and performing identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device.
-
Citations
23 Claims
-
1. A method, comprising:
-
determining, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identifying a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generating validation information to authenticate identity of the source user; sending the validation information to a second device operated by the target user; receiving a validation response from the first device operated by the source user; and performing identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
-
one or more processors to; determine, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identify a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generate validation information to authenticate identity of the source user; send the validation information to a second device operated by the target user; receive a validation response from the first device operated by the source user; and perform identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device; and one or more memories coupled to the one or more processors, configured to provide the one or more processors with instructions. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer program product, the computer program product being embodied in a tangible non-transitory computer readable storage medium and comprising computer instructions for:
-
determining, in response to a request from a first device operated by a source user, that an identity authentication is to be performed for the source user; identifying a target user who is deemed to satisfy at least a preset condition, the target user being a user other than the source user; generating validation information to authenticate identity of the source user; sending the validation information to a second device operated by the target user; receiving a validation response from the first device operated by the source user; and performing identity authentication, including verifying whether the validation response received from the first device operated by the source user matches the validation information sent to the second device.
-
Specification