Authenticating a login
First Claim
Patent Images
1. A method for authenticating an access to a computer system, comprising:
- initiating an automated telephonic communication channel to a telephone of a user in response to an initiation of a login by the user via an online communication channel to the computer system;
prompting via the automated telephonic communication channel for the user to recall a security response and provide the security response via the automated telephonic communication channel.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for authenticating a login that avoid the imposition of memorization burdens on users of a computer system. The present techniques include determining whether an appropriate token is stored on a client system that originates the login, authenticating a login by communicating with a user via a secondary communication channel, and authenticating a login by engaging in a private question/private answer dialogue with a user.
60 Citations
13 Claims
-
1. A method for authenticating an access to a computer system, comprising:
-
initiating an automated telephonic communication channel to a telephone of a user in response to an initiation of a login by the user via an online communication channel to the computer system; prompting via the automated telephonic communication channel for the user to recall a security response and provide the security response via the automated telephonic communication channel. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for authenticating an access to a computer system, comprising:
-
initiating an automated telephonic communication channel to a telephone of a user in response to an initiation of a login by the user via an online communication channel to the computer system; specifying via the automated telephonic communication channel a response and prompting via the automated telephonic communication channel for the user to provide the response via the automated telephonic communication channel to grant the access. - View Dependent Claims (8, 9)
-
-
10. A method for authenticating an access to a computer system, comprising:
-
obtaining a username via a first communication channel to the computer system; initiating an automated telephonic communication channel to a telephone of a user associated with the username wherein the automated telephonic communication channel is different from the first communication channel; transmitting an automated prompt via the automated telephonic communication channel that prompts the user to recall a security response and provide the security response back via the automated telephonic communication channel. - View Dependent Claims (11, 12)
-
-
13. A method for authenticating an access to a computer system, comprising:
-
obtaining a username via a first communication channel to the computer system; initiating an automated telephonic communication channel to a telephone of a user associated with the username wherein the automated telephonic communication channel is different from the first communication channel; transmitting an automated prompt via the automated telephonic communication channel wherein the automated prompt carries a validation input and prompts the user to provide the validation input back via the automated telephonic communication channel to grant the access.
-
Specification