×

Two-factor user authentication using near field communication

  • US 8,478,196 B1
  • Filed: 07/03/2012
  • Issued: 07/02/2013
  • Est. Priority Date: 02/17/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving, at a mobile computing device including one or more processors, a first request from a user for the mobile computing device to obtain a first identifier from a near field communication (NFC) tag;

    scanning, at the mobile computing device, the NFC tag via NFC in response to receiving the first request;

    receiving, at the mobile computing device, the first identifier corresponding to the NFC tag via the scanning;

    storing, at the mobile computing device, the first identifier at a memory of the mobile computing device in response to receiving the first identifier;

    transitioning, at the mobile computing device, from an unlocked state to a locked state after storing the first identifier at the memory, wherein the user has access to one or more functions of the mobile computing device in the unlocked state and does not have access to the one or more functions of the mobile computing device in the locked state;

    receiving, at the mobile computing device, a second request from the user to transition the mobile computing device from the locked state to the unlocked state;

    outputting, at the mobile computing device, a third request for the user to input a first password via a user interface of the mobile computing device, wherein the first password is stored at the memory and is associated with the user;

    receiving, at the mobile computing device, a second password from the user via the user interface;

    determining, at the mobile computing device, whether the second password matches the first password;

    outputting, at the mobile computing device, a fourth request for the user to input the first identifier by scanning for the first NFC tag using the mobile computing device when the second password matches the first password;

    scanning, at the mobile computing device, for the first NFC tag via NFC;

    receiving, at the mobile computing device, a second NFC identifier via the scanning for the first NFC tag using the mobile computing device;

    determining, at the mobile computing device, whether the second NFC identifier matches the first NFC identifier stored at the memory; and

    transitioning, at the mobile computing device, from the locked state to the unlocked state when the second NFC identifier matches the first NFC identifier.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×