Systems and methods for authentication and verification
DCFirst Claim
1. A method of using a computer system to authenticate a user seeking to conduct at least one interaction with a secured capability provided by a computer, the method comprising:
- using the computer system to receive a first signal from the computer providing the secured capability, the first signal comprising a reusable identifier corresponding to the secured capability, the reusable identifier assigned for use by the secured capability for a finite period of time;
using the computer system to receive a second signal from an electronic device being used by the user, the second signal comprising a copy of the reusable identifier and user verification information;
using a processor of the computer system to evaluate, based at least on the first signal and the second signal, whether the user is authorized to conduct the at least one interaction with the secured capability; and
in response to an indication from the processor that the user is authorized to conduct the at least one interaction with the secured capability, using the computer system to transmit a third signal comprising authorization information to at least one of the electronic device and the computer.
2 Assignments
Litigations
0 Petitions
Accused Products
Abstract
Computer systems and methods are provided for authenticating a user seeking to conduct at least one interaction with a secured capability provided by a computer. The method includes receiving a first signal from the computer providing the secured capability. The first signal includes a reusable identifier corresponding to the secured capability. The method further includes receiving a second signal from an electronic device being used by the user. The second signal includes a copy of the reusable identifier and user verification information. The method further includes using a processor to evaluate, based at least on the first signal and the second signal, whether the user is authorized to conduct the at least one interaction with the secured capability. The method further includes, in response to an indication from the processor that the user is authorized to conduct the at least one interaction with the secured capability, transmitting a third signal including authorization information to at least one of the electronic device and the computer.
-
Citations
22 Claims
-
1. A method of using a computer system to authenticate a user seeking to conduct at least one interaction with a secured capability provided by a computer, the method comprising:
-
using the computer system to receive a first signal from the computer providing the secured capability, the first signal comprising a reusable identifier corresponding to the secured capability, the reusable identifier assigned for use by the secured capability for a finite period of time; using the computer system to receive a second signal from an electronic device being used by the user, the second signal comprising a copy of the reusable identifier and user verification information; using a processor of the computer system to evaluate, based at least on the first signal and the second signal, whether the user is authorized to conduct the at least one interaction with the secured capability; and in response to an indication from the processor that the user is authorized to conduct the at least one interaction with the secured capability, using the computer system to transmit a third signal comprising authorization information to at least one of the electronic device and the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 21)
-
-
11. A computer system for authenticating users seeking to conduct interactions with a plurality of secured capabilities, the computer system comprising:
-
a first input configured to receive a plurality of first signals from a plurality of computers, each computer of the plurality of computers providing at least one secured capability of the plurality of secured capabilities, each first signal of the plurality of first signals comprising a reusable identifier corresponding to a secured capability of the plurality of secured capabilities, the reusable identifier assigned for use by the secured capability for a finite period of time; a second input configured to receive a plurality of second signals from a plurality of electronic devices being used by the users, each second signal of the plurality of second signals comprising a copy of a reusable identifier and user verification information; a storage device comprising; a first association of each secured capability of the plurality of secured capabilities with at least one corresponding reusable identifier; and a second association of the user verification information with corresponding verified users authorized to access at least one secured capability of the plurality of secured capabilities; a processor configured to evaluate, based at least on a first signal received from a computer of the plurality of computers and a second signal received from an electronic device of the plurality of electronic devices, whether a user of the electronic device is authorized to conduct at least one interaction with a secured capability provided by the computer and corresponding to the reusable identifier; and an output configured to transmit a third signal comprising authorization information to at least one of the electronic device and the computer providing the secured capability corresponding to the reusable identifier, if the user of the electronic device is authorized to conduct the at least one interaction with the secured capability corresponding to the reusable identifier. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 22)
-
-
20. A non-transitory computer storage having stored thereon a computer program that instructs a computer system to authenticate a user seeking to conduct at least one interaction with a secured capability provided by a computer by at least:
-
receiving a first signal from the computer providing the secured capability, the first signal comprising a reusable identifier corresponding to the secured capability, the reusable identifier assigned for use by the secured capability for a finite period of time; receiving a second signal from an electronic device being used by the user, the second signal comprising a copy of the reusable identifier and user verification information; using a processor to evaluate, based at least on the first signal and the second signal, whether the user is authorized to conduct the at least one interaction with the secured capability; and in response to an indication from the processor that the user is authorized to conduct the at least one interaction with the secured capability, transmitting a third signal comprising authorization information to at least one of the electronic device and the computer.
-
Specification