Authenticating to a computing device with a near-field communications card
First Claim
1. A method performed by a computing device, the method comprising:
- at the computing device, wirelessly receiving an authentication code from an authentication card via near-field communications (NFC);
providing the authentication code received wirelessly via NFC to an authentication service configured to authenticate a user of the computing device based on the authentication code; and
in response to the authentication service authenticating the user based on the authentication code received wirelessly via NFC, providing the user with access to a resource via the computing device;
wherein wirelessly receiving the authentication code from the authentication card via NFC is performed in response to the user attempting to access the resource via the computing device;
wherein the method further comprises, subsequent to providing the user with access to the resource via the computing device;
receiving a follow-up attempt request from the user to attempt to access the resource via the computing device again after a period of time;
performing a risk-based analysis to determine whether access to the resource is high-risk or low-risk; and
selectively;
allowing the user to access the resource without further use of the authentication card if the access to the resource has been determined to be low-risk by the risk-based analysis; and
prompting the user to present the authentication card for further authentication if the access to the resource has been determined to be high-risk by the risk-based analysis.
9 Assignments
0 Petitions
Accused Products
Abstract
A method is performed by a computing device. The method includes, (a) at the computing device, wirelessly receiving an authentication code from an authentication card via near-field communications (NFC), (b) providing the authentication code received wirelessly via NFC to an authentication service configured to authenticate the user of the computing device based on the authentication code, and (c) in response to the authentication service authenticating the user based on the authentication code received wirelessly via NFC, providing the user with access to a resource via the computing device. Analogous computer program products and apparatuses are also provided described.
-
Citations
18 Claims
-
1. A method performed by a computing device, the method comprising:
-
at the computing device, wirelessly receiving an authentication code from an authentication card via near-field communications (NFC); providing the authentication code received wirelessly via NFC to an authentication service configured to authenticate a user of the computing device based on the authentication code; and in response to the authentication service authenticating the user based on the authentication code received wirelessly via NFC, providing the user with access to a resource via the computing device; wherein wirelessly receiving the authentication code from the authentication card via NFC is performed in response to the user attempting to access the resource via the computing device; wherein the method further comprises, subsequent to providing the user with access to the resource via the computing device; receiving a follow-up attempt request from the user to attempt to access the resource via the computing device again after a period of time; performing a risk-based analysis to determine whether access to the resource is high-risk or low-risk; and selectively; allowing the user to access the resource without further use of the authentication card if the access to the resource has been determined to be low-risk by the risk-based analysis; and prompting the user to present the authentication card for further authentication if the access to the resource has been determined to be high-risk by the risk-based analysis. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An apparatus comprising:
-
a near-field communications (NFC) transceiver; a processor; and memory, the memory storing a set of instructions, which when executed by the processor, cause the processor to perform the following operations; wirelessly receiving, via the NFC transceiver, an authentication code from an authentication card; providing the authentication code received wirelessly via the NFC transceiver to an authentication service configured to authenticate a user of the apparatus based on the authentication code; and in response to authenticating the user based on the authentication code received wirelessly via the NFC transceiver, providing the user with access to a resource via the apparatus; wherein the set of instructions, when executed by the processor, cause the processor to wirelessly receive the authentication code from the authentication card via the NFC transceiver in response to the user attempting to access the resource via the apparatus; wherein the set of instructions stored within memory, when executed by the processor, further cause the processor to, upon receiving a follow-up attempt request from the user to attempt to access the resource via the computing device again after a period of time; perform a risk-based analysis to determine whether access to the resource is high-risk or low-risk; and selectively; allow the user to access the resource without further use of the authentication card if the access to the resource has been determined to be low-risk by the risk-based analysis; and prompt the user to present the authentication card for further authentication if the access to the resource has been determined to be high-risk by the risk-based analysis. - View Dependent Claims (15, 16, 17)
-
-
18. A computer program product comprising a tangible non-transitory computer-readable storage medium storing instructions, which, when executed by a computing device, cause the computing device to perform the following operations:
-
wirelessly receiving an authentication code from an authentication card via near-field communications (NFC); providing the authentication code received wirelessly via NFC to an authentication service configured to authenticate a user of the computing device based on the authentication code; and in response to the authentication service authenticating the user based on the authentication code received wirelessly via NFC, providing the user with access to a resource via the computing device; wherein the instructions, when executed by the computing device, cause the computing device to wirelessly receive the authentication code from the authentication card via NFC in response to the user attempting to access the resource via the computing device; wherein the instructions, when executed by the computing device, further cause the computing device to, upon receiving a follow-up attempt request from the user to attempt to access the resource via the computing device again after a period of time; perform a risk-based analysis to determine whether access to the resource is high-risk or low-risk; and selectively; allow the user to access the resource without further use of the authentication card if the access to the resource has been determined to be low-risk by the risk-based analysis; and prompt the user to present the authentication card for further authentication if the access to the resource has been determined to be high-risk by the risk-based analysis.
-
Specification