×

Multi factor authentication

  • US 8,365,258 B2
  • Filed: 09/26/2007
  • Issued: 01/29/2013
  • Est. Priority Date: 11/16/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of authenticating a user for accessing a resource, said method relying on multi-factor authentication of the user, the method comprising the steps of:

  • associating the user with registration information particular to the user, wherein said registration information includes a first factor authentication information;

    associating the user with a second factor authentication information;

    subsequent to associating the user with a second factor authentication information, receiving information of a first instance of a first factor authentication step, said first factor authentication step comprising the user inputting a first live user authentication information across a first communications network and matching the first live user authentication information to the registered first factor authentication information;

    confirming that the first live user authentication information matches the first factor authentication information for the user;

    upon receipt of the information of the first instance of the first factor authentication step, performing a first instance of a second factor authentication step, said second factor authentication step comprising—

    placing a telephone call or sending a text message to the user across a second communications network and at a previously-stored number associated with a telecommunications device of the user,in response to placing said telephone call or sending said text message to the user, receiving a second live user authentication information inputted by the user at the user'"'"'s telecommunications device,confirming that said second live user authentication information provided by the user via the user'"'"'s telecommunications device matches the second factor authentication information associated with the user, andupon confirming that the second live user authentication information matches the second factor authentication information, identifying the user as being authorized to access the resource;

    wherein said second live user authentication information is only the pound key or only the star key on a keypad of the user'"'"'s telecommunications device;

    receiving information of the user performing a second instance of said first factor authentication step;

    determining if the second instance of said first factor authentication step is within a predetermined period of time since the first instance of said second factor authentication step;

    if the second instance of said first factor authentication step is outside the predetermined period of time, performing a second instance of said second factor authentication step for the user; and

    if the second instance of said first factor authentication step is within the predetermined period of time, not performing the second instance of said second factor authentication step for the user.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×