USER-CONTROLLED TRANSACTION ANNOTATION FOR AUTHENTICATION EVENTS ACROSS MULTIPLE USER DEVICES
First Claim
1. A computer-implemented method comprising steps of:
- receiving, via a first user device in connection with a request to access a protected resource associated with the user, a first set of user-generated cryptographic information and a second set of user-generated cryptographic information;
generating and outputting an authentication request to a second user device in response to processing the first set of user-generated cryptographic information against a stored set of cryptographic information associated with the protected resource, wherein the authentication request causes the second set of user-generated cryptographic information to be rendered via the second user device; and
resolving the authentication request in response to receiving, via the second user device, an indication to grant or deny the request to access the protected resource via the first user device;
wherein the steps are performed by at least one processing device comprising a processor coupled to a memory.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods, apparatus, and processor-readable storage media for user-controlled transaction tagging to enable easier identification and co-relation of subsequent related events are provided herein. An example computer-implemented method includes receiving, via a first user device in connection with a request to access a protected resource, a first set of user-generated cryptographic information and a second set of user-generated cryptographic information; generating and outputting an authentication request to a second user device in response to processing the first set of user-generated cryptographic information against a stored set of cryptographic information associated with the protected resource, wherein the authentication request causes the second set of user-generated cryptographic information to be rendered via the second user device; and resolving the authentication request in response to receiving, via the second user device, an indication to grant or deny the request to access the protected resource via the first user device.
-
Citations
20 Claims
-
1. A computer-implemented method comprising steps of:
-
receiving, via a first user device in connection with a request to access a protected resource associated with the user, a first set of user-generated cryptographic information and a second set of user-generated cryptographic information; generating and outputting an authentication request to a second user device in response to processing the first set of user-generated cryptographic information against a stored set of cryptographic information associated with the protected resource, wherein the authentication request causes the second set of user-generated cryptographic information to be rendered via the second user device; and resolving the authentication request in response to receiving, via the second user device, an indication to grant or deny the request to access the protected resource via the first user device; wherein the steps are performed by at least one processing device comprising a processor coupled to a memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory processor-readable storage medium having stored therein program code of one or more software programs, wherein the program code when executed by at least one processing device causes the at least one processing device:
-
to receive, via a first user device in connection with a request to access a protected resource associated with the user, a first set of user-generated cryptographic information and a second set of user-generated cryptographic information; to generate and output an authentication request to a second user device in response to processing the first set of user-generated cryptographic information against a stored set of cryptographic information associated with the protected resource, wherein the authentication request causes the second set of user-generated cryptographic information to be rendered via the second user device; and to resolve the authentication request in response to receiving, via the second user device, an indication to grant or deny the request to access the protected resource via the first user device. - View Dependent Claims (14, 15, 16)
-
-
17. An apparatus comprising:
-
at least one processing device comprising a processor coupled to a memory; the at least one processing device being configured; to receive, via a first user device in connection with a request to access a protected resource associated with the user, a first set of user-generated cryptographic information and a second set of user-generated cryptographic information; to generate and output an authentication request to a second user device in response to processing the first set of user-generated cryptographic information against a stored set of cryptographic information associated with the protected resource, wherein the authentication request causes the second set of user-generated cryptographic information to be rendered via the second user device; and to resolve the authentication request in response to receiving, via the second user device, an indication to grant or deny the request to access the protected resource via the first user device. - View Dependent Claims (18, 19, 20)
-
Specification