SYSTEMS AND METHODS FOR AUTHENTICATING USER FOR SECURE DATA ACCESS USING MULTI-PARTY AUTHENTICATION SYSTEM
First Claim
1. A method for authenticating a user for accessing secure data from a first data provider, the method comprising:
- receiving, by an authentication system of a second data provider, user credentials and authentication information associated with a user of the first data provider;
storing the user credentials and authentication information in an authentication profile associated with the user at the authentication system;
receiving, by the authentication system, user credentials from the first data provider;
detecting that the stored authentication profile includes user credentials that match the received user credentials;
transmitting a challenge message to a user device associated with the user, the challenge message prompting the user device for authentication information;
receiving a challenge response from the user device, the challenge response including collected authentication information;
authenticating the user based on the authentication profile and the collected authentication information of the challenge response; and
notifying, by the authentication system, the first data provider that the user is authenticated, wherein the first data provider permits the user to access the secure data in response to the user being authenticated.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authenticating a user for accessing secure data from a first data provider is provided. The method is implemented by an authentication system of a second data provider. The method includes receiving user credentials and authentication information associated with a user and storing the user credentials and authentication information in an authentication profile associated with the user. The method further includes receiving user credentials from the first data provider, detecting that the stored authentication profile includes user credentials that match the received user credentials and transmitting a challenge message to a user device associated with the user. The challenge message prompts the user device for authentication information. The method additionally includes receiving a challenge response including collected authentication information from the user device, authenticating the user based on the authentication profile and the collected authentication information, and notifying the first data provider that the user is authenticated.
21 Citations
24 Claims
-
1. A method for authenticating a user for accessing secure data from a first data provider, the method comprising:
-
receiving, by an authentication system of a second data provider, user credentials and authentication information associated with a user of the first data provider; storing the user credentials and authentication information in an authentication profile associated with the user at the authentication system; receiving, by the authentication system, user credentials from the first data provider; detecting that the stored authentication profile includes user credentials that match the received user credentials; transmitting a challenge message to a user device associated with the user, the challenge message prompting the user device for authentication information; receiving a challenge response from the user device, the challenge response including collected authentication information; authenticating the user based on the authentication profile and the collected authentication information of the challenge response; and notifying, by the authentication system, the first data provider that the user is authenticated, wherein the first data provider permits the user to access the secure data in response to the user being authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An authentication system for authenticating a user for accessing secure data from a first data provider, the authentication system comprising a processor and a memory in communication with the processor, wherein the processor is programmed to:
-
receive user credentials and authentication information associated with a user of the first data provider; store the user credentials and authentication information in an authentication profile associated with the user at the authentication system; receive user credentials from the first data provider; detect that the stored authentication profile includes user credentials that match the received user credentials; transmit a challenge message to a user device associated with the user, the challenge message prompting the user device for authentication information; receive a challenge response from the user device, the challenge response including collected authentication information; authenticate the user based on the authentication profile and the collected authentication information of the challenge response; and notify the first data provider that the user is authenticated, wherein the first data provider permits the user to access the secure data in response to the user being authenticated. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable storage media for authenticating a user for access to secure data, the computer-readable storage media having computer-executable instructions embodied thereon, wherein, when executed by at least one processor, the computer-executable instructions cause the processor to:
-
receive user credentials and authentication information associated with a user of a first data provider; store the user credentials and authentication information in an authentication profile associated with the user in a memory associated with the processor; receive user credentials from the first data provider; detect that the stored authentication profile includes user credentials that match the received user credentials; transmit a challenge message to a user device associated with the user, the challenge message prompting the user device for authentication information; receive a challenge response from the user device, the challenge response including collected authentication information; authenticate the user based on the authentication profile and the collected authentication information of the challenge response; and notify the first data provider that the user is authenticated, wherein the first data provider permits the user to access the secure data in response to the user being authenticated. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification