Method and system for authentication
First Claim
1. A method of authenticating a communications session between two or more user communications devices over a plurality of communications channels comprising:
- creating a first set of signatures by the first user communications device, wherein the first set of signatures comprises a unique signature for each of a plurality of communications channels;
communicating one of said first set of signatures to a second user communications device comprising a first authentication module over one of said plurality of communications channels, wherein the first authentication module of said second user communications device retrieves a verification key from local storage and authenticates the first user communications device'"'"'s signature associated with the one of said plurality of communications channels using the retrieved verification key;
accepting communication with the first user communications device only if the first user communications device'"'"'s signature is successfully authenticated by said first authentication module;
communicating, only if a second of the plurality of communications channels are required, a second of said first set of signatures to the second user communications device over a second of said plurality of communications channels, wherein the first authentication module of said second user communications device retrieves a verification key from local storage and authenticates the first user communications device'"'"'s second signature using the retrieved verification key; and
accepting communication with the first user communications device over the second communications channel only if the second signature is successfully authenticated by said first authentication module.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system of authenticating communications sessions between two or more parties over one or more simultaneous communications channels using one or more communicating devices is provided including having a first party create a first set of signatures, wherein the first set of signatures includes a signature for each communications channel, communicating with at a second party over at least one communications channel, whereby the second party authenticates the first party'"'"'s signature associated with the at least one communications channel and accepts communication with the first party.
77 Citations
20 Claims
-
1. A method of authenticating a communications session between two or more user communications devices over a plurality of communications channels comprising:
-
creating a first set of signatures by the first user communications device, wherein the first set of signatures comprises a unique signature for each of a plurality of communications channels; communicating one of said first set of signatures to a second user communications device comprising a first authentication module over one of said plurality of communications channels, wherein the first authentication module of said second user communications device retrieves a verification key from local storage and authenticates the first user communications device'"'"'s signature associated with the one of said plurality of communications channels using the retrieved verification key; accepting communication with the first user communications device only if the first user communications device'"'"'s signature is successfully authenticated by said first authentication module; communicating, only if a second of the plurality of communications channels are required, a second of said first set of signatures to the second user communications device over a second of said plurality of communications channels, wherein the first authentication module of said second user communications device retrieves a verification key from local storage and authenticates the first user communications device'"'"'s second signature using the retrieved verification key; and accepting communication with the first user communications device over the second communications channel only if the second signature is successfully authenticated by said first authentication module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for authenticating a communications session between two or more communicating parties over a plurality of communication channels, the system comprising:
-
a first user communications device, the first user communications device configured to create a first set of signatures comprising a unique signature for each of a plurality of communications channels; a second user communications device, said first user communications device comprising a first authentication module; and a plurality of communications channel linked to the first and second communications devices; wherein the first user communications device is configured to communicate one of said first set of signatures to the second user communications device over one of said plurality of communications channels; wherein the second user communications device is further configured to; retrieve a verification key from local storage in response to receiving a set of signatures; authenticate the first user communications device'"'"'s signature associated with the one of said plurality of communications channels using the retrieved verification key; accept communication with the first user communications device only if the first user communications device'"'"'s signature is successfully authenticated by said first authentication module; receive, only if a second of the plurality of communications channels are required, a second of said first set of signatures from the first user communications device over a second of said plurality of communications channels; retrieve a verification key from local storage and authenticates the first user communications device'"'"'s second signature using the retrieved verification key; and accept communication with the first user communications device over the second communications channel only if the second signature is successfully authenticated by said first authentication module. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computer program product encoded in a computer readable storage device for instructing a system to authenticate a communications session between two or more user communications devices over a plurality of communications channels, the computer program product configured to instruct a system to perform the steps of:
-
instructing the first user communications device to create a first set of signatures, wherein the first set of signatures comprises a unique signature for each of a plurality of communications channels; instructing the communication of at least one of said first set of signatures over one of said plurality of communications channels to a second user communications device, said second user communications device comprising a first authentication component; instructing said first authentication component to retrieve a verification key from local storage and authenticate the first user communications device'"'"'s signature associated with the one of said plurality of communications channels using the retrieved verification key; instructing said second user communications device to accept communication with said first user communications device only if the first user communications device'"'"'s signature is successfully authenticated by said first authentication module; instructing said first user communications device to communicate, only if a second of the plurality of communications channels are required, a second of said first set of signatures to the second user communications device over a second of said plurality of communications channels; instructing said first authentication component to retrieve a verification key from local storage and authenticate the first user communication device'"'"'s second signature using the retrieved verification key; and instructing said second user communications device to accept communication with said first user communications device over said second communications channel only if said second signature is successfully authenticated by said first authentication module. - View Dependent Claims (18, 19, 20)
-
Specification