System and method for user authentication
First Claim
Patent Images
1. A computer-implemented authentication method, comprising:
- (a) receiving an authentication request at an authentication computing system, the request including a resource identifier;
(b) identifying one or more authentication pools associated with the resource identifier, each authentication pool including at least one authentication method selected from the group including a password, passphrase, personal identification number, challenge response, identification card, wristband, security token, software token, cell phone, biometric information, fingerprint, retinal pattern, signature, face, and voice;
(c) executing a pool authentication process for the one or more identified authentication pools, the pool authentication process including a two stage authentication process, including at least one first stage that includes performing an authentication method implementation included in the authentication pool and a second stage dependent on the first stage; and
(d) transmitting a response to the identification authentication request based on the execution of the pool authentication process for the one or more identified authentication pools.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented authentication method is described. The method includes the steps of (a) receiving an authentication request at an authentication computing system, the request including a resource identifier, (b) identifying one or more authentication pools associated with the resource identifier, each authentication pool including at least one authentication method implementation, (c) executing a pool authentication process for the one or more identified authentication pools, and (d) transmitting a response to the identification authentication request based on the execution of the pool authentication process for the one or more identified authentication pools.
-
Citations
20 Claims
-
1. A computer-implemented authentication method, comprising:
-
(a) receiving an authentication request at an authentication computing system, the request including a resource identifier; (b) identifying one or more authentication pools associated with the resource identifier, each authentication pool including at least one authentication method selected from the group including a password, passphrase, personal identification number, challenge response, identification card, wristband, security token, software token, cell phone, biometric information, fingerprint, retinal pattern, signature, face, and voice; (c) executing a pool authentication process for the one or more identified authentication pools, the pool authentication process including a two stage authentication process, including at least one first stage that includes performing an authentication method implementation included in the authentication pool and a second stage dependent on the first stage; and (d) transmitting a response to the identification authentication request based on the execution of the pool authentication process for the one or more identified authentication pools. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented authentication system, comprising:
-
an authentication data table, the table including one or more resource identifiers, and at least one authentication pool associated with each resource identifier, the pool including at least one authentication method selected from the group including a password, passphrase, personal identification number, challenge response, identification card, wristband, security token, software token, cell phone, biometric information, fingerprint, retinal pattern, signature, face, and voice; an authentication engine configured to receive an authentication request at an authentication computing system, the request including a resource identifier, identify one or more authentication pools associated with the resource identifier, and execute a pool authentication process for the one or more identified authentication pools, the pool authentication process including a two stage authentication process, including at least one first stage that includes performing an authentication method implementation included in the authentication pool and a second stage dependent on the first stage; and an authentication reporting engine configured to provide a response to the identification authentication request based on the execution of the pool authentication process for the one or more identified authentication pools. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-implemented authentication system for use in administering a controlled substance, comprising:
-
an authentication data table, the table including one or more resource identifiers associated with the controlled substance, and at least two authentication pools associated with the one or more resource identifiers, each pool including at least one authentication method selected from the group including a password, passphrase, personal identification number, challenge response, identification card, wristband, security token, software token, cell phone, biometric information, fingerprint, retinal pattern, signature, face, and voice; an authentication engine configured to receive an authentication request at an authentication computing system, the request including a resource identifier, identify at least first and second authentication pools associated with the resource identifier, execute a pool authentication process for the first identified authentication pool, including executing a first authentication method implementation, and execute a pool authentication process for the second identified authentication pool, including executing a second authentication method implementation that is different than the first authentication method; and an authentication reporting engine configured to provide a response to the identification authentication request based on a determination indicating successful execution of the first and second pool authentication processes for the at least first and second identified authentication pools. - View Dependent Claims (19, 20)
-
Specification