Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
First Claim
Patent Images
1. A method for authenticating a user of an application requiring secure access to the application using a mobile access point, an authentication system, and a wireless device associated with the user, the method comprising:
- providing an invocation element on the wireless device, the invocation element being activated by a single user action on a user interface of the wireless device;
receiving an indication at the authentication system that the invocation element has been activated;
obtaining a location of the wireless device;
determining whether the user of the wireless device is an authorized user based on a previously registered association between a wireless device identifier associated with the wireless device and an application identifier associated with the application using the authentication system;
approving the user to use the application using the authentication system based on a predetermined location criterion related to at least one of the obtained wireless device location and a location of the mobile access point, when the wireless device is associated with an authorized user, wherein the mobile access point comprises a personal computing device configured to execute software applications that send and receive data over a data network and wherein the predetermined location criterion comprises a determination that the wireless device and the mobile access point are within a predetermined proximity of one another; and
producing an indication on the wireless device that the user has been authenticated when the user was approved using the authentication system, whereby the user can be reliably authenticated for use of the application with a single activation of the invocation element.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user includes providing an invocation element capable of being activated by a single user action, receiving an indication that the invocation element has been activated, obtaining a location of a wireless device associated with the user, determining whether the wireless device is associated with an authorized user, approving the user to use the application based on a predetermined location criterion, and producing an indication that the user has been authenticated.
53 Citations
39 Claims
-
1. A method for authenticating a user of an application requiring secure access to the application using a mobile access point, an authentication system, and a wireless device associated with the user, the method comprising:
-
providing an invocation element on the wireless device, the invocation element being activated by a single user action on a user interface of the wireless device; receiving an indication at the authentication system that the invocation element has been activated; obtaining a location of the wireless device; determining whether the user of the wireless device is an authorized user based on a previously registered association between a wireless device identifier associated with the wireless device and an application identifier associated with the application using the authentication system; approving the user to use the application using the authentication system based on a predetermined location criterion related to at least one of the obtained wireless device location and a location of the mobile access point, when the wireless device is associated with an authorized user, wherein the mobile access point comprises a personal computing device configured to execute software applications that send and receive data over a data network and wherein the predetermined location criterion comprises a determination that the wireless device and the mobile access point are within a predetermined proximity of one another; and producing an indication on the wireless device that the user has been authenticated when the user was approved using the authentication system, whereby the user can be reliably authenticated for use of the application with a single activation of the invocation element. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium including instructions that, when executed by a processing device, enable the processing device to perform a method of authenticating a user of an application requiring secure access to the application using a mobile access point and a wireless device associated with the user, the method comprising the steps of:
-
providing an invocation element activated by a single user action on a user interface of the wireless device; receiving an indication at the authentication system that the invocation element has been activated; obtaining a location of the wireless device; determining whether the user of the wireless device is an authorized user based on a previously registered association between a wireless device identifier associated with the wireless device and an application identifier associated with the application; approving the user to use the application based on a predetermined location criterion related to at least one of the obtained wireless device location and a location of the mobile access point, when the wireless device is associated with an authorized user, wherein the mobile access point comprises a personal computing device configured to execute software applications that send and receive data over a data network and wherein the predetermined location criterion comprises a determination that the wireless device and the mobile access point are within a predetermined proximity of one another; and producing an indication on the wireless device that the user has been authenticated when the user was approved, whereby the user can be reliably authenticated for use of the application with a single activation of the invocation element. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A system for authenticating a user of an application requiring secure access to the application using a mobile access point in data communication with the application and a wireless device associated with the user, the system comprising:
-
a memory; and a processor in data communication with the memory, the mobile access point, and the wireless device, wherein the processor is configured to; provide an invocation element being activated by a single user action on a user interface of the wireless device; receive an indication that the invocation element has been activated; obtain a location of the wireless device; determine whether the user of the wireless device is an authorized user based on a previously registered association between a wireless device identifier associated with the wireless device and an application identifier associated with the application; approve the user to use the application based on a predetermined location criterion related to at least one of the obtained wireless device location and a location of the mobile access point, when the wireless device is associated with an authorized user, wherein the mobile access point comprises a personal computing device configured to execute software applications that send and receive data over a data network and wherein the predetermined location criterion comprises a determination that the wireless device and the mobile access point are within a predetermined proximity of one another; and produce an indication on the wireless device that the user has been authenticated when the user was approved, whereby the user can be reliably authenticated for use of the application with a single activation of the invocation element.
-
Specification