Two-factor anti-phishing authentication systems and methods
First Claim
1. A computerized method of providing access to a secure resource, the method comprising:
- to each of a plurality of authorized users, providing a link to the secure resource, wherein each link includes a unique password embedded therein and wherein each unique password relates to a particular user identification (userID) and personal identification number (PIN);
receiving a request to access the resource using a link having a password embedded therein, wherein the request originates at a web browser;
directing the browser to a login screen;
receiving via the login screen a userID and PIN;
determining whether the userID and PIN relate to one another and to the password; and
allowing or denying access to the resource in accordance with the determination.
3 Assignments
0 Petitions
Accused Products
Abstract
A computerized method of providing access to a secure resource includes, to each of a plurality of authorized users, providing a link to the secure resource. Each link includes a unique password embedded therein and each unique password relates to a particular user identification (userID) and personal identification number (PIN). The method also includes receiving a request to access the resource using a link having a password embedded therein, which request originates at a web browser. The method further includes directing the browser to a login screen and receiving via the login screen a userID and PIN. The method also includes determining whether the userID and PIN relate to one another and to the password and allowing or denying access to the resource in accordance with the determination.
-
Citations
5 Claims
-
1. A computerized method of providing access to a secure resource, the method comprising:
-
to each of a plurality of authorized users, providing a link to the secure resource, wherein each link includes a unique password embedded therein and wherein each unique password relates to a particular user identification (userID) and personal identification number (PIN); receiving a request to access the resource using a link having a password embedded therein, wherein the request originates at a web browser; directing the browser to a login screen; receiving via the login screen a userID and PIN; determining whether the userID and PIN relate to one another and to the password; and allowing or denying access to the resource in accordance with the determination. - View Dependent Claims (2, 3)
-
-
4. A computerized method of providing access to a secure resource, the method comprising:
-
to each of a plurality of authorized users, providing a link to the secure resource, wherein each link includes a unique password embedded therein and wherein each unique password relates to a particular user identification (userID) and personal identification number (PIN); receiving a request to access the resource using a link not having a password embedded therein, wherein the request originates at a web browser; directing the browser to a login screen; receiving via the login screen a userID and PIN; determining that the userID and PIN relate to a user also having a password; directing the user to login via a bookmark having the password; receiving a subsequent request to access the resource using a link having a password embedded therein; directing the browser to the login screen; receiving via the login screen the userID and PIN; determining whether the userID and PIN relate to one another and to the password; and allowing or denying access to the resource in accordance with the determination.
-
-
5. A computerized method of providing access to a secure resource, the method comprising:
-
a custodian of the resource providing to each of a plurality of authorized users a link to the secure resource, wherein each link includes a unique password embedded therein and wherein each unique password relates to a particular user identification (userID) and personal identification number (PIN); an unauthorized user obtaining a userID and password from an authorized user; the unauthorized user attempting to access the resource without providing the embedded password; and the custodian directing the unauthorized user to attempt to access the resource using a link having the password.
-
Specification