Computer-implemented method for mobile authentication and corresponding computer system
First Claim
1. A computerized method comprising:
- receiving, at a computing device, a verification request to verify a login request to log into a user account associated with a service provider on another computing device;
receiving, by the computing device and from a personal-smart card that is separate from the computing device, authentication information configured for logging into the user account from the computing device;
receiving, by the computing device, a user verification for confirming logging into the user account; and
transmitting, by the computing device, the authentication information and the user verification to the service provider for logging the user account into the another computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment of the present invention a computerized method includes receiving at a personal-mobile device a first communication, which includes information for requesting user verification for logging into an account of a user, via a computing device. The account is with a service provided by an application server. The method includes starting a personal-authentication application on the personal-mobile device in response to receiving the first communication, and receiving in the personal-authentication application a user verification for confirming logging into the account. The method includes logging into the account via the computing device based on receipt of the user verification. Embodiments of the present invention provide enhanced security for logging into an account that a user may have with a service by providing that a personal-mobile device, such as a mobile telephone, which is personal to a user, is configured as a security token for login to the account.
8 Citations
20 Claims
-
1. A computerized method comprising:
-
receiving, at a computing device, a verification request to verify a login request to log into a user account associated with a service provider on another computing device; receiving, by the computing device and from a personal-smart card that is separate from the computing device, authentication information configured for logging into the user account from the computing device; receiving, by the computing device, a user verification for confirming logging into the user account; and transmitting, by the computing device, the authentication information and the user verification to the service provider for logging the user account into the another computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions for:
-
receiving, at a computing device, a verification request to verify a login request to log into a user account associated with a service provider on another computing device; receiving, by the computing device and from a personal-smart card that is separate from the computing device, authentication information configured for logging into the user account from the computing device; receiving, by the computing device, a user verification for confirming logging into the user account; and transmitting, by the computing device, the authentication information and the user verification to the service provider for logging the user account into the another computing device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer implemented system, comprising:
-
one or more computer processors; and a non-transitory computer-readable storage medium comprising instructions, that when executed, control the one or more computer processors to be configured for; receiving, at a computing device, a verification request to verify a login request to log into a user account associated with a service provider on another computing device; retrieving, by the computing device and from a smart-card that is separate from the computing device, authentication information configured for logging into the user account from the computing device; receiving, by the computing device, a user verification for confirming logging into the user account; and transmitting, by the computing device, the authentication and the user verification to the service provider for logging the user account into the another computing device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification