Methods for the secure use of one-time passwords
First Claim
1. An authentication method comprising:
- connecting to an authentication server over a first channel;
submitting a request including a user ID;
receiving connection verification information over a second channel from the authentication server;
deciding to continue based on the connection verification information; and
submitting a one-time password.
6 Assignments
0 Petitions
Accused Products
Abstract
Methods for authentication over unsecure networks using one-time passwords methods are provided. The methods establish a connection over a first channel between an authentication system and a user'"'"'s computing system, then the authentication system determines information based on the connection over the first channel, such as the IP address and other information that can be readily found once the IP address is known. The information derived from the connection is then provided to the user over a second channel, and the user is given an opportunity to review the information before deciding whether to continue the login. If the information returned to the user over the second channel is suspicious, this can indicate to the user that the connection over the first channel has been compromised.
-
Citations
34 Claims
-
1. An authentication method comprising:
-
connecting to an authentication server over a first channel; submitting a request including a user ID; receiving connection verification information over a second channel from the authentication server; deciding to continue based on the connection verification information; and submitting a one-time password. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An authentication method comprising:
-
accepting a connection over a first channel, the connection characterized by an IP address of a user computing system; serving a login page to the IP address; receiving a request including a claimant target; determining connection verification information; communicating the connection verification information over a second channel; and receiving a one-time password. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. An authentication system comprising:
an authentication server configured to accept a connection to an IP address over a first channel; serve a login page to the IP address; receive a request including a claimant target from the IP address; determine connection verification information; communicate the connection verification information over a second channel to a device address associated with the claimant target; and receive a one-time password. - View Dependent Claims (29, 30, 31, 32, 33, 34)
Specification