Secure and efficient login and transaction authentication using IPhones™ and other smart mobile communication devices
First Claim
1. A method of authenticating a user of a mobile communication device, comprising:
- directing, by a first program executing on the mobile communication device, transmission, from the mobile communication device to a security server, of a request for authentication of the user in connection with either (i) the user logging into or (ii) the user entering into a transaction with a network site;
receiving, by a second program executing on the mobile communication device, the request for authentication from the security server;
directing, by the second program, presentation by the mobile communication device of the received request for authentication to the user;
receiving, by the second program, a user input to the mobile communication device indicating that the requested authentication should proceed;
directing, by the second program in response to the received user input, transmission, from the mobile communication device to the security server, of an indication that the requested authorization should proceed;
receiving, by the second program from the security server, a personal identification number (PIN), in response to the transmission of the indication that the requested authorization should proceed; and
directing, by the first program, transmission, from the mobile communications device to the network site, of the PIN received by the second program, to authenticate the user or transaction to the network site.
10 Assignments
0 Petitions
Accused Products
Abstract
To authenticate a user of a mobile communication device for login or transaction authorization, a first application on the device directs transmission of a request for authentication of the user to a security server. A second application on the device receives the request for authentication from the security server and directs presentation of the received request for authentication to the user by the device. The second application receives a user input to the device indicating that the requested authentication should proceed and in response directs transmission of an indication that the requested authorization should proceed, to the security server. In response to this latter transmission, the second application receives a PIN from the authentication server. The first application directs transmission of the PIN received by the second application to the network site, which validates the transmitted PIN, in order to authenticate the user or the transaction to the network site.
-
Citations
18 Claims
-
1. A method of authenticating a user of a mobile communication device, comprising:
-
directing, by a first program executing on the mobile communication device, transmission, from the mobile communication device to a security server, of a request for authentication of the user in connection with either (i) the user logging into or (ii) the user entering into a transaction with a network site; receiving, by a second program executing on the mobile communication device, the request for authentication from the security server; directing, by the second program, presentation by the mobile communication device of the received request for authentication to the user; receiving, by the second program, a user input to the mobile communication device indicating that the requested authentication should proceed; directing, by the second program in response to the received user input, transmission, from the mobile communication device to the security server, of an indication that the requested authorization should proceed; receiving, by the second program from the security server, a personal identification number (PIN), in response to the transmission of the indication that the requested authorization should proceed; and directing, by the first program, transmission, from the mobile communications device to the network site, of the PIN received by the second program, to authenticate the user or transaction to the network site. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An article of manufacture for authenticating a user of a mobile communication device, comprising:
-
non-transitory processor readable storage medium; and a program stored on the storage medium, wherein the stored program is configured to be readable by a processor and thereby cause the processor to operate so as to; receive, from a security server, a request for authentication sf the user in connection with either (i) the user logging into or (ii) the user entering into a transaction with a network site; direct a display, by the mobile communication device, of the received request for authentication; receive a user input to the mobile communication device indicating that the requested authentication should proceed; direct, in response to the received user input, transmission, from the mobile communication device to the security server, of an indication that the requested authorization should proceed; receive, from the security server, a personal identification number (PIN), in response to the transmission of the indication that the requested authorization should proceed; and make available the received PIN to another program executable by the mobile communications device, to thereby facilitate transmission of the received PIN from the mobile communication device to the network site to thereby authenticate the user or the transaction to the network site. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method of operating a security server to authenticate a user of a mobile communication device, comprising:
-
receiving, from a first program executing on the mobile communication device that is in an active session with a network site, a request for authentication of the user in connection with either (i) the user logging into or (ii) the user entering into a transaction with the network site; transmitting to a second program executing on the mobile communication device, the received request for authentication; receiving, from the second program, an indication that the requested authorization should proceed; and transmitting, to the second program, a personal identification number (PIN), in response to the received indication that the requested authorization should proceed and to authenticate the user to the network site. - View Dependent Claims (16, 17, 18)
-
Specification