System and method for second factor authentication
First Claim
1. A method for providing enhanced transaction security, comprising:
- receiving a request message from a third party at a gateway, wherein the request message comprises a plurality of data fields indicative of a transaction involving the third party and a mobile subscriber;
processing the received request message by;
obtaining, from at least one repository, previously collected information about the mobile subscriber involved in the transaction;
identifying, based on the request message, rules and configuration data governing application of Second Factor Authentication (SFA) from at least one source of dynamically configurable data to provide an implementation of SFA; and
generating a SFA token based on the identifying;
saving results of the processing, including saving at least the generated SFA token;
generating a mobile subscriber notification message comprising at least the generated SFA token; and
generating a third party notification message comprising at least the generated SFA token.
1 Assignment
0 Petitions
Accused Products
Abstract
As individuals increasingly engage in different types of transactions they face a growing threat from, possibly among other things, identity theft, financial fraud, information misuse, etc. and the serious consequences or repercussions of same. Leveraging the ubiquitous nature of wireless devices and the popularity of (Short Message Service, Multimedia Message Service, etc.) messaging, an infrastructure that enhances the security of the different types of transactions within which a wireless device user may participate through a Second Factor Authentication facility. The infrastructure may optionally leverage the capabilities of a centrally-located Messaging Inter-Carrier Vendor.
48 Citations
36 Claims
-
1. A method for providing enhanced transaction security, comprising:
-
receiving a request message from a third party at a gateway, wherein the request message comprises a plurality of data fields indicative of a transaction involving the third party and a mobile subscriber; processing the received request message by; obtaining, from at least one repository, previously collected information about the mobile subscriber involved in the transaction; identifying, based on the request message, rules and configuration data governing application of Second Factor Authentication (SFA) from at least one source of dynamically configurable data to provide an implementation of SFA; and generating a SFA token based on the identifying; saving results of the processing, including saving at least the generated SFA token; generating a mobile subscriber notification message comprising at least the generated SFA token; and generating a third party notification message comprising at least the generated SFA token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system configured to provide enhanced transaction security, comprising:
-
a gateway configured to receive a request message from a third party, wherein the request message comprises a plurality of data fields indicative of a transaction involving the third party and a mobile subscriber; and at least one workflow module configured to; process the received request message by; obtaining, from at least one repository, previously collected information about the mobile subscriber involved in the transaction; identifying, based on the request message, rules and configuration data governing application of Second Factor Authentication (SFA) from at least one source of dynamically configurable data to provide an implementation of SFA; and generating a SFA token based on the identifying; save the SFA token; generate a mobile subscriber notification message comprising at least the generated SFA token; and generate a third party notification message comprising at least the generated SFA token. - View Dependent Claims (14, 15, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
16. A computer-readable storage device having control logic recorded thereon that when executed by a processor, causes the processor to perform operations comprising:
-
receiving a request message from a third party at a gateway, wherein the request message comprises a plurality of data fields indicative of a transaction involving the third party and a mobile subscriber; processing the received request message by; obtaining, from at least one repository, previously collected information about the mobile subscriber involved in the transaction; identifying, based on the request message, rules and configuration data governing application of Second Factor Authentication (SFA) from at least one source of dynamically configurable data to provide an implementation of SFA; and generating a SFA token based on the identifying; saving results of the processing, including at least the generated SFA token; generating a mobile subscriber notification message comprising at least the generated SFA token; and generating a third party notification message comprising at least the generated SFA token. - View Dependent Claims (17, 18, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification