×

PERSON-TO-PERSON NETWORK ARCHITECTURE FOR SECURE AUTHORIZATION AND APPROVAL

  • US 20200137068A1
  • Filed: 10/21/2019
  • Published: 04/30/2020
  • Est. Priority Date: 05/05/2017
  • Status: Active Grant
First Claim
Patent Images

1. A system for configuring and executing a secure communication network for authorizing access to safeguarded resources, the system comprising:

  • a memory device; and

    one or more processing devices operatively coupled to the memory device, wherein the one or more processing devices are configured to execute computer-readable program code to;

    configure a secure dedicated communication channel between a computing device of a first user and a computing device of a second user;

    transmit, via the secure dedicated communication channel, to the computing device of the second user, an alert notifying the second user that the first user has requested the second user to accept access to the account associated with the first user;

    detect, from the computing device of the second user, that the second user has accepted access to the account associated with the first user;

    in response to receiving the acceptance, transmit control signals configured to cause the computing device of the second user to display notification of an authentication challenge and a request for an input of an authentication challenge response, wherein the authentication challenge is configured to query memory of the computing device of the second user to retrieve data that identifies the second user and the input is authorization by the second user to query the memory of the computing device of the second user;

    in response to the second user providing the input that authorizes querying of the memory of the computing device of the second user, receive, from the computing device of the second user, the authentication challenge response including the data that identifies the second user;

    compare the received data that identifies the second user with historical data associated with the second user to determine that the received authentication challenge response is acceptable; and

    in response to determining that the received authentication challenge response is acceptable, grant the second user with access rights to the account associated with the first user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×