Method and system for automated user authentication
First Claim
Patent Images
1. A method for authenticating a telephone number, comprising:
- receiving, at a server, a user-inputted telephone number over a communication channel;
providing, from the server, a security code to a user over the communication channel;
in response to a user request, delaying, at the server, an initiation of a voice telephone call session to the user-inputted telephone number for a predetermined period of time;
initiating, at the server, the voice telephone call session to the user-inputted telephone number;
prompting, from the server, the user over the voice telephone call session for the security code; and
responsive to receiving the security code, at the server, from the user over the voice telephone call session, authenticating the user-inputted telephone number.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating a telephone number. The method includes receiving a user-inputted telephone number over a communication channel. The method includes providing a security code to a user over the communication channel. The method includes initiating a voice telephone call session to the user-inputted telephone number. The method includes prompting the user over the voice telephone call session. The method includes responsive to receiving the security code from the user over the voice telephone call session, authenticating the user-inputted telephone number.
62 Citations
40 Claims
-
1. A method for authenticating a telephone number, comprising:
-
receiving, at a server, a user-inputted telephone number over a communication channel; providing, from the server, a security code to a user over the communication channel; in response to a user request, delaying, at the server, an initiation of a voice telephone call session to the user-inputted telephone number for a predetermined period of time; initiating, at the server, the voice telephone call session to the user-inputted telephone number; prompting, from the server, the user over the voice telephone call session for the security code; and responsive to receiving the security code, at the server, from the user over the voice telephone call session, authenticating the user-inputted telephone number. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for accepting delayed payment of prepaid cards, comprising:
-
a server, the server in communications with a workstation over a data network and a telephone over a telephone network, wherein the server is configured to receive a user-inputted telephone number, in response to a user request, delaying an initiation of a voice telephone call session over the telephone network to a telephone associated with the user-inputted telephone number for a predetermined period of time; initiate the voice telephone call session over the telephone network to the telephone associated with the user-inputted telephone number, provide a security code to a user via the workstation over the data network, prompt the user at the workstation to enter the security code over the voice telephone call session, and responsive to receiving the security code from the user over the voice telephone call session, authenticating the user-inputted telephone number. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system for accepting delayed payment of prepaid cards, comprising:
-
a server, the server in communications with a workstation over a data network and a telephone over a telephone network, wherein the server is configured to receive a user-inputted telephone number, in response to a user request, delay an initiation of a voice telephone call session to a telephone associated with the user-inputted telephone number for a predetermined period of time; initiate the voice telephone call session over the telephone network to the telephone associated with the user-inputted telephone number, provide a security code to a user via the workstation over the data network, wherein the security code is encrypted for transmission over the data network, prompt the user to enter the security code over the voice telephone call session, wherein the security code is encrypted for transmission over the voice telephone call session, and responsive to receiving the security code from the user over the voice telephone call session, authenticating the user-inputted telephone number. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer-implemented method for periodic authentication of a user account, the method comprising:
-
receiving a telephone number; associating the received telephone number with the user account, the user account being associated with a user; providing a security code to the user, the security code being associated with the user account; initiating a voice telephone call session to the received telephone number; prompting the user over the voice telephone call session for the security code; responsive to receiving the security code from the user over the voice telephone call session, authenticating the user account associated with the telephone number and the security code; and re-authenticating the user account after a first lapse of a first predetermined period of time. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
-
33. A system for periodic authentication of a user account, the system comprising:
-
a server, the server in communications with a workstation over a data network and a telephone over a telephone network, wherein the server is configured to receive a telephone number, associate the received telephone number with the user account, wherein the user account is associated with a user, provide a security code to the user, the security code being associated with the user account, initiate a voice telephone call session to the received telephone number, prompt the user over the voice telephone call session for the security code, responsive to receiving the security code from the user over the voice telephone call session, authenticate the user account associated with the telephone number and the security code, and re-authenticate the user account after a first lapse of a first predetermined period of time. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40)
-
Specification