SYSTEMS AND METHODS FOR AUTHENTICATION AND VERIFICATION
2 Assignments
0 Petitions
Accused Products
Abstract
Computer systems and methods are provided for authenticating a user seeking to conduct at least one interaction with a secured capability provided by a computer. The method includes accessing a first identifier corresponding to the secured capability and sending a second identifier to an electronic device being used by the user. The second identifier corresponds to the secured capability. The method further includes receiving a signal from the electronic device being used by the user. The method further includes using a processor to evaluate, based at least on the signal and one or both of the first identifier and the second identifier, whether the user is authorized to conduct the at least one interaction with the secured capability.
-
Citations
29 Claims
-
1. (canceled)
-
2. A method of using a computer system to authenticate a user seeking to conduct at least one interaction with a secured capability provided by a computer, the method comprising:
-
accessing a first identifier corresponding to the secured capability; sending a second identifier to an electronic device being used by the user, the second identifier corresponding to the secured capability; receiving a signal from the electronic device being used by the user; and using a processor to evaluate, based at least on the signal and one or both of the first identifier and the second identifier, whether the user is authorized to conduct the at least one interaction with the secured capability. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A computer system for authenticating users seeking to conduct interactions with a plurality of secured capabilities provided by a plurality of computers, each computer of the plurality of computers providing at least one secured capability of the plurality of secured capabilities, the computer system comprising:
-
at least one input configured to access a plurality of first identifiers, each first identifier of the plurality of first identifiers corresponding to a secured capability of the plurality of secured capabilities; at least one output configured to send a plurality of second identifiers to a plurality of electronic devices being used by the users, each second identifier of the plurality of second identifiers corresponding to a secured capability of the plurality of secured capabilities, the at least one input further configured to receive a signal from the plurality of electronic devices being used by the users; a storage device comprising; a first association of each secured capability of the plurality of secured capabilities with at least one corresponding identifier; and a second association of verification data with corresponding verified users authorized to access at least one secured capability of the plurality of secured capabilities; a processor configured to evaluate, based at least on the signal and one or both of a first identifier of the plurality of first identifiers and a second identifier of the plurality of second identifiers, whether a user of the electronic device is authorized to conduct at least one interaction with a secured capability provided by the computer. - View Dependent Claims (28)
-
-
29. A non-transitory computer storage having stored thereon a computer program that instructs a computer system to authenticate a user seeking to conduct at least one interaction with a secured capability provided by a computer by at least:
-
accessing a first identifier corresponding to the secured capability; sending a second identifier to an electronic device being used by the user, the second identifier corresponding to the secured capability; receiving a signal from the electronic device being used by the user; and using a processor to evaluate, based at least on the signal and one or both of the first identifier and the second identifier, whether the user is authorized to conduct the at least one interaction with the secured capability.
-
Specification