Verifying access to a network account over multiple user communication portals based on security criteria
First Claim
Patent Images
1. A computer-implemented method for verifying authorization of access to a network account, comprising:
- at a server associated with a user network account;
associating a first user communication portal with the user network account;
receiving an access request to access the user network account from a second user communication portal;
in response to the access request;
determining security criteria related to the second user communication portal; and
passing a security verification request to the first user communication portal when the security criteria is of a predetermined value, wherein the security verification request includes a request for a user of the first user communication portal to decide whether to verify authorization of access to the user network account via the second user communication portal;
receiving a communication from the first user communication portal in response to the security verification request, wherein the communication includes information indicative of a user response to the security verification request;
performing an account access operation enabling access to the user network account from the second communication portal based on the user response to the security verification request; and
wherein the first and second user communication portals comprise devices distinct from the server.
3 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented system and method for verifying access to a network account are provided. A first user communication portal is associated with a user network account. A request to access the user network account is received from a second user communication portal. Security criteria related to the second user communication portal is determined. Access to the user network account is enabled upon receipt of a communication associated with the first user communication portal when the security criteria is of a predetermined value.
137 Citations
40 Claims
-
1. A computer-implemented method for verifying authorization of access to a network account, comprising:
at a server associated with a user network account; associating a first user communication portal with the user network account; receiving an access request to access the user network account from a second user communication portal; in response to the access request;
determining security criteria related to the second user communication portal; and
passing a security verification request to the first user communication portal when the security criteria is of a predetermined value, wherein the security verification request includes a request for a user of the first user communication portal to decide whether to verify authorization of access to the user network account via the second user communication portal;receiving a communication from the first user communication portal in response to the security verification request, wherein the communication includes information indicative of a user response to the security verification request; performing an account access operation enabling access to the user network account from the second communication portal based on the user response to the security verification request; and wherein the first and second user communication portals comprise devices distinct from the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
20. A server for verifying access to a network account, comprising:
-
at least one processor; an associating module that associates a first user communication portal with a user network account; a request receiving module that receives an access request to access the user network account from a second user communication portal; a security determination module that determines security criteria related to the second user communication portal; a communication module that passes a security verification request to the first user communication portal when the security criteria is of a predetermined value, wherein the security verification request includes a request for a user of the first user communication portal to decide whether to verify authorization of access to the user network account via the second user communication portal; an account access module that receives a communication from the first user communication portal in response to the security verification request, wherein the communication includes information indicative of a user response to the security verification request, and performs an account access operation enabling access to the user network account from the second communication portal based on the user response to the security verification request; and wherein the first and second user communication portals comprise devices distinct from the server. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A computer-implemented method for verifying access to a network account, comprising:
at a server associated with a user network account; associating a user telecommunications number with the user network account; receiving an access request to access the user network account from a computer; determining security criteria related to the computer, wherein the security criteria comprises information about at least one of a location of the computer and a presence of spyware or malware at the computer; based on the security criteria, requesting a confirmation from a device associated with the user telecommunications number, wherein requesting a confirmation includes a request for a user of the device to decide whether to verify authorization of access to the user network account via the computer; receiving the confirmation from the device associated with the user telecommunications number, wherein the confirmation includes information indicative of a user response to the request for a confirmation; enabling access to the user network account at the computer based on receiving the user response to the request for confirmation; and wherein the device and the computer are distinct from the server.
-
40. A server for verifying access to a network account, comprising:
-
at least one processor; an associating module that associates a user telecommunications number with a user network account; a request receiving module that receives an access request to access the user network account from a computer; a security determination module that determines security criteria related to the computer, wherein the security criteria comprises information about at least one of a location of the computer and a presence of spyware or malware at the computer; an identity verifier module that passes a confirmation request to a device associated with the user telecommunications number based on the security criteria, wherein the confirmation request includes a request for a user of the device to decide whether to verify authorization of access to the user network account via the computer; a multiple security portal module that receives a confirmation from the device associated with the user telecommunications number, wherein the confirmation includes information indicative of a user response to the request for a confirmation; and
enables access to the user network account at the computer based on receiving the user response to the confirmation request; andwherein the device and the computer are distinct from the server.
-
Specification