MULTI-FACTOR AUTHENTICATION WITH URL VALIDATION
First Claim
Patent Images
1. A computer program product, the computer program product being tangibly embodied on a non-transitory computer-readable storage medium and comprising instructions that, when executed, are configured to cause at least one computing device to:
- receive an authentication request from a user for access to a network resource via a first communications channel, the authentication request including at least one authentication parameter;
generate a user-specific authentication code, based on the at least one authentication parameter;
generate a user-specific authentication Uniform Resource Locator (URL) for an access page, based on the user-specific authentication code;
send the authentication URL to the user via a second communications channel;
receive an access request in response to selection of the authentication URL by the user, the access request associated with at least one access parameter;
validate the access request, including matching the at least one authentication parameter with the at least one access parameter; and
provide the access page to the user, in response to the matching, the access page indicating grant of access to the network resource.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques are provided for providing multi-factor authentication with Uniform Resource Locator (URL) validation (MFAUV). One of the multiple authentication factors used may include a unique, user-specific URL that is sent to the user within a message. In this way, the user may simply click on, or otherwise execute or select, the provided URL, directly from within the message in which the URL is provided.
-
Citations
20 Claims
-
1. A computer program product, the computer program product being tangibly embodied on a non-transitory computer-readable storage medium and comprising instructions that, when executed, are configured to cause at least one computing device to:
-
receive an authentication request from a user for access to a network resource via a first communications channel, the authentication request including at least one authentication parameter; generate a user-specific authentication code, based on the at least one authentication parameter; generate a user-specific authentication Uniform Resource Locator (URL) for an access page, based on the user-specific authentication code; send the authentication URL to the user via a second communications channel; receive an access request in response to selection of the authentication URL by the user, the access request associated with at least one access parameter; validate the access request, including matching the at least one authentication parameter with the at least one access parameter; and provide the access page to the user, in response to the matching, the access page indicating grant of access to the network resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method, comprising:
-
receiving an authentication request from a user for access to a network resource via a first communications channel, the authentication request including at least one authentication parameter; generating a user-specific authentication code, based on the at least one authentication parameter; generating a user-specific authentication Uniform Resource Locator (URL) for an access page, based on the user-specific authentication code; sending the authentication URL to the user via a second communications channel; receiving an access request in response to selection of the authentication URL by the user, the access request associated with at least one access parameter; validating the access request, including matching the at least one authentication parameter with the at least one access parameter; and providing the access page to the user, in response to the matching, the access page indicating grant of access to the network resource. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A computer program product, the computer program product being tangibly embodied on a non-transitory computer-readable storage medium and comprising instructions that, when executed, are configured to cause at least one computing device to:
-
receive an authentication request from a user for a network resource; execute a first authentication factor with respect to the user; execute a second authentication factor with respect to the user, including receiving at least one authentication parameter that is unique to the user, via a client operable to provide the network resource; selecting a uniform resource locator (URL) for a web page associated with the client; parameterizing the URL using the at least one authentication parameter, to obtain an authentication URL that is unique to the user sending a message to the user that contains the authentication URL receiving at least one access parameter in conjunction with a selection of the authentication URL by the user; matching the at least one access parameter with the at least one authentication parameter; and validate the authentication request, based on the matching, to provide the user with access to the network resource. - View Dependent Claims (19, 20)
-
Specification