Methods and systems for secure key entry via communication networks
First Claim
Patent Images
1. A member authentication method, comprising:
- receiving, at a security server from a client server, a member authentication request associated with a member attempting to access confidential information from the client server via a first member device associated with the member;
determining at the security server a secure key associated with the member, wherein the secure key comprises an ordered sequence of symbols including at least one symbol comprising an image of member-generated content;
determining a one-time plurality of symbol sets associate with the secure key, wherein the ordered sequence of symbols is included within the plurality of symbol sets;
transmitting data associated with the secure key from the security server to a second member device associated with the member, wherein the data associated with the secure key comprises a matrix having columns and rows, each column in the matrix representing one of the symbol sets, and further wherein said second member device includes a display and a touch screen keypad on said display, wherein a matrix size of said matrix is selected by the security server based at least in part on a size of said display;
entering, by the member, using the touch screen keypad, secure key information into the second member device, said secure key information comprises one of;
(i) a sequence of matrix row selections entered by the member without including matrix column selections, or (ii) a sequence of matrix column selections entered by the member without including matrix row selections;
receiving, at the security server from the second member device, the secure key information;
validating the secure key information at the security server; and
based on the validated secure key information, authenticating the member;
responsive to said authentication, transmitting, by the client server, the confidential information from the client server to the first member device.
2 Assignments
0 Petitions
Accused Products
Abstract
According to some embodiments, a member authentication request is received at a security server from a client server. The member authentication request may be associated with, for example, a member attempting to access confidential information from the client server. A secure key associated with the member may be determined and data associated with that key may be transmitted to the member (e.g., via his or her wireless device or computer). Secure key information may be received from the member and validated. Based on the validated secure key information, it may be arranged for the member to receive the confidential information from the client server.
9 Citations
15 Claims
-
1. A member authentication method, comprising:
-
receiving, at a security server from a client server, a member authentication request associated with a member attempting to access confidential information from the client server via a first member device associated with the member; determining at the security server a secure key associated with the member, wherein the secure key comprises an ordered sequence of symbols including at least one symbol comprising an image of member-generated content; determining a one-time plurality of symbol sets associate with the secure key, wherein the ordered sequence of symbols is included within the plurality of symbol sets; transmitting data associated with the secure key from the security server to a second member device associated with the member, wherein the data associated with the secure key comprises a matrix having columns and rows, each column in the matrix representing one of the symbol sets, and further wherein said second member device includes a display and a touch screen keypad on said display, wherein a matrix size of said matrix is selected by the security server based at least in part on a size of said display; entering, by the member, using the touch screen keypad, secure key information into the second member device, said secure key information comprises one of;
(i) a sequence of matrix row selections entered by the member without including matrix column selections, or (ii) a sequence of matrix column selections entered by the member without including matrix row selections;receiving, at the security server from the second member device, the secure key information; validating the secure key information at the security server; and based on the validated secure key information, authenticating the member; responsive to said authentication, transmitting, by the client server, the confidential information from the client server to the first member device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transient computer-readable medium storing instructions adapted to be executed by a processor to perform a method, said method comprising:
-
receiving, at a security server from a client server, a member authentication request associated with a member attempting to access confidential information from the client server via a first member device associated with the member; determining at the security server a secure key associated with the member; transmitting matrix data associated with the secure key from the security server to a second member device associated with the member, the second member device including a display and a touch screen, the matrix data being associated with a matrix having columns and rows of symbols, wherein at least one symbol comprises an image of member-generated content and a matrix size of said matrix is selected by the security server based at least in part based on a size of said display; receiving from the second member device one of;
(i) an ordered list of column identifiers associated with the matrix data entered by the member via the touch screen without receiving any row identifiers, or (ii) an ordered list of row identifiers associated with the matrix data without receiving any column identifiers;validating the ordered list of identifiers at the security server; and based on the validated ordered list of identifiers, authenticating the member; responsive to said authentication, transmitting, by the client server, the confidential information from the client server to the first member device.
-
Specification