Method and apparatus for providing authentication
First Claim
1. A method for providing authentication, comprising:
- receiving, via a processor, a request from a customer to access a service via a first user endpoint device;
sending, via the processor, a first authentication request to the customer for a first authentication information;
receiving, via the processor, the first authentication information;
determining, via the processor, a type of authentication for a second authentication request to be sent to a second user endpoint device;
launching, via the processor, the second authentication request to the customer for a second authentication information to the second user endpoint device that is triggered when the first authentication information is received from the first user endpoint device via a first access network, wherein the first user endpoint device is different from the second user endpoint device; and
enabling, via the processor, the customer to proceed with accessing the service when the second authentication information is received from the second user endpoint device via a second access network, wherein the first access network and the second access network are different.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for providing authentication are disclosed. For example, the method receives a request from a customer to access a service via a first user endpoint device, and sends a first authentication request to the customer for first authentication information. The method then sends a second authentication request to the customer for second authentication information via a second user endpoint device if the first authentication information is received, wherein the first user endpoint device is different from the second user endpoint device. The method then enables the customer to proceed with accessing the service if the second authentication information is received.
105 Citations
18 Claims
-
1. A method for providing authentication, comprising:
-
receiving, via a processor, a request from a customer to access a service via a first user endpoint device; sending, via the processor, a first authentication request to the customer for a first authentication information; receiving, via the processor, the first authentication information; determining, via the processor, a type of authentication for a second authentication request to be sent to a second user endpoint device; launching, via the processor, the second authentication request to the customer for a second authentication information to the second user endpoint device that is triggered when the first authentication information is received from the first user endpoint device via a first access network, wherein the first user endpoint device is different from the second user endpoint device; and enabling, via the processor, the customer to proceed with accessing the service when the second authentication information is received from the second user endpoint device via a second access network, wherein the first access network and the second access network are different. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer-readable medium storing a plurality of instructions which, when executed by a processor, cause the processor to perform a method operations for authentication, the operations comprising:
-
receiving a request from a customer to access a service via a first user endpoint device; sending a first authentication request to the customer for a first authentication information; receiving the first authentication information; determining a type of authentication for a second authentication request to be sent to a second user endpoint device; launching the second authentication request to the customer for a second authentication information to the second user endpoint device that is triggered when the first authentication information is received from the first user endpoint device via a first access network, wherein the first user endpoint device is different from the second user endpoint device; and enabling the customer to proceed with accessing the service when the second authentication information is received from the second user endpoint device via a second access network, wherein the first access network and the second access network are different. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. An apparatus for providing authentication, comprising:
-
a processor; and a computer-readable medium storing a plurality of instructions which, when executed by the processor, cause the processor to perform operations, the operations comprising; receiving a request from a customer to access a service via a first user endpoint device; sending a first authentication request to the customer for a first authentication information; receiving the first authentication information; determining a type of authentication for a second authentication request to be sent to a second user endpoint device; launching the second authentication request to the customer for a second authentication information to the second user endpoint device that is triggered when the first authentication information is received from the first user endpoint device via a first access network, wherein the first user endpoint device is different from the second user endpoint device; and enabling the customer to proceed with accessing the service when the second authentication information is received from the second user endpoint device via a second access network, wherein the first access network and the second access network are different.
-
Specification