System and method for authenticating remote server access
First Claim
Patent Images
1. An apparatus for authenticating that a valid user is accessing a website from a remote computer device comprising:
- means for receiving user information from a computing device;
means for identifying a communication device based upon the user information;
means for transmitting an authentication request to the communication device on a wireless communication network, wherein the authentication request is configured to request at least an authentication key that is stored on the communication device;
means for receiving an authentication response from the communication device, the authentication response containing at least the authentication key;
means for determining if the authentication key is valid; and
means for granting the computing device access to a website if the authentication key is valid.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for providing secure authentication for website access or other secure transaction. In one embodiment, when a user accesses a website, the web server identifies the user, and sends an authentication request to the user'"'"'s mobile device. The mobile device receives the authentication requests and sends back authentication key to the web server. Upon verifying the authentication key, the web server grants access to the user.
49 Citations
33 Claims
-
1. An apparatus for authenticating that a valid user is accessing a website from a remote computer device comprising:
-
means for receiving user information from a computing device; means for identifying a communication device based upon the user information; means for transmitting an authentication request to the communication device on a wireless communication network, wherein the authentication request is configured to request at least an authentication key that is stored on the communication device; means for receiving an authentication response from the communication device, the authentication response containing at least the authentication key; means for determining if the authentication key is valid; and means for granting the computing device access to a website if the authentication key is valid. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A wireless device for authenticating a user accessing a website comprising:
-
means for receiving at the wireless device an authentication request from a server; means for prompting the user to enter a security code; means for verifying the security code; means for retrieving an authentication key from memory at the wireless device; and means for sending the authentication key to the server if the security code is verified. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. An apparatus for providing a secure transaction for a remote computer device to a server, comprising:
-
means for receiving user information from a computing device; means for identifying a communication device based upon the user information; means for transmitting an authentication request to the communication device, wherein the authentication request is configured to request at least an authentication key that is stored on the communication device; means for receiving an authentication response from the communication device, the authentication response containing at least the authentication key; means for determining if the authentication key is valid; and means for performing the secure transaction with the computing device if the authentication key is valid. - View Dependent Claims (15, 16, 17)
-
-
18. A non-transitory computer-readable medium comprising instructions, which, when executed by a machine, cause the machine to perform operations, the instructions comprising:
-
at least one instruction to receive user information from a computing device; at least one instruction to identify a communication device based upon the user information; at least one instruction to transmit an authentication request to the communication device, wherein the authentication request is configured to request at least an authentication key that is stored on the communication device; at least one instruction to receive an authentication response from the communication device, the authentication response containing at least the authentication key; at least one instruction to determine if the authentication key is valid; and at least one instruction to perform a secure transaction with the computing device if the authentication key is valid. - View Dependent Claims (19, 20)
-
-
21. A method for authenticating that a valid user is accessing a serving computer device from a remote computer device comprising:
-
transmitting user information from the remote computer device, wherein the remote computer device includes a cellular modem; receiving an authentication request via the cellular modem over a wireless communication network, wherein the authentication request is configured to request at least an authentication key that is stored on the remote computer device; transmitting an authentication response from the remote computer device, the authentication response containing at least the authentication key; and receiving a message granting the remote computer device access to the serving computer device if the authentication key is valid. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A remote computer device configured to authenticate that a valid user can access a serving computer device, the remote computer device comprising:
-
means for transmitting user information from the remote computer device, wherein the remote computer device includes a cellular modem; means for receiving an authentication request via the cellular modem over a wireless communication network, wherein the authentication request is configured to request at least an authentication key that is stored on the remote computer device; means for transmitting an authentication response from the remote computer device, the authentication response containing at least the authentication key; and means for receiving a message granting the remote computer device access to the serving computer device if the authentication key is valid.
-
-
32. A non-transitory computer-readable medium comprising instructions, which, when executed by a remote computer device, cause the remote computer device to perform operations for authenticating that a valid user is accessing a serving computer device, the instructions comprising:
-
at least one instruction to transmit user information from the remote computer device, wherein the remote computer device includes a cellular modem; at least one instruction to receive an authentication request via the cellular modem over a wireless communication network, wherein the authentication request is configured to request at least an authentication key that is stored on the remote computer device; at least one instruction to transmit an authentication response from the remote computer device, the authentication response containing at least the authentication key; and at least one instruction to receive a message granting the remote computer device access to the serving computer device if the authentication key is valid.
-
-
33. A remote computer device configured to authenticate that a valid user can access a serving computer device, the remote computer device comprising:
an authentication unit configured; to transmit user information from the remote computer device, wherein the remote computer device includes a cellular modem; to receive an authentication request via the cellular modem over a wireless communication network, wherein the authentication request is configured to request at least an authentication key that is stored on the remote computer device; to transmit an authentication response from the remote computer device, the authentication response containing at least the authentication key; and to receive a message granting the remote computer device access to the serving computer device if the authentication key is valid.
Specification