User-defined identity verification system
First Claim
1. A user authentication system comprising:
- one or more processors;
one or more storage memories; and
,a user authentication module comprising instructions for causing the one or more processors to execute a method of a user authentication application for providing authentication of a user, the method comprising;
receiving, by the one or more processors of the user authentication application, a primary log in factor to be associated with a user;
receiving from a server a request verification of one or more smart devices to be associated with the user after the user has been verified by the one or more smart devices;
determining a user identification list of one or more smart devices being verified by the server with a device authenticator, wherein the user authentication application receives the device authenticator sent from the one or more smart devices for server verification;
receiving a request for authentication of the user;
determining if one or more of the verified smart devices on the user identification list are within a defined vicinity of the user; and
,providing a user authentication if the primary log in factor provided with the request for authentication matches the primary log in factor associated with the user and one or more of the verified smart devices on the user identification list are within a defined vicinity of the user.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and application for providing a user authentication or verification of a user identity are provided. A primary log in factor is created by a user. In addition, one or more smart devices associated with the user are verified by the user to create a list of user authentication devices. Upon a request for user authentication, a combination of the correct primary log in factor and a determination that the user is within the vicinity of at least one of the user authentication devices on the list are used to determine the authenticity of the user. A user authentication may be used to unlock a secured application on a user device or to authenticate a transaction with a third party. Methods and machine-readable medium for user authentication are also provided.
114 Citations
32 Claims
-
1. A user authentication system comprising:
-
one or more processors; one or more storage memories; and
,a user authentication module comprising instructions for causing the one or more processors to execute a method of a user authentication application for providing authentication of a user, the method comprising; receiving, by the one or more processors of the user authentication application, a primary log in factor to be associated with a user; receiving from a server a request verification of one or more smart devices to be associated with the user after the user has been verified by the one or more smart devices; determining a user identification list of one or more smart devices being verified by the server with a device authenticator, wherein the user authentication application receives the device authenticator sent from the one or more smart devices for server verification; receiving a request for authentication of the user; determining if one or more of the verified smart devices on the user identification list are within a defined vicinity of the user; and
,providing a user authentication if the primary log in factor provided with the request for authentication matches the primary log in factor associated with the user and one or more of the verified smart devices on the user identification list are within a defined vicinity of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A user authentication system comprising:
-
a user authentication server; a user device; a user authentication device; and
,a user authentication application comprising instructions for causing the server, the user device and the one or more authentication devices to execute a method for providing authentication of a user, the method comprising; inputting, on the user device, a log in request and a primary log in factor; sending, from the user device, the log in request and primary log in factor to the user authentication server; sending, from the user authentication server, a push notification with a device token to the user authentication device, which is separate from the user device, for requesting verification of the user authentication device, the user device receiving the device token sent from the user authentication device for server verification; sending, from the user device, the device token to the user authentication server after the user is verified by the user authentication device; and
,sending, by the user authentication server, a user authentication if the primary loci in factor and the device token are acceptable to the user device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A non-transitory machine-readable storage medium comprising machine readable instructions for causing a processor to execute a method for providing authentication of a user, the method comprising:
-
receiving, by the processor, a request for authentication of the user from a user device; determining if a password provided with the request for authentication matches the master password associated with the user; sending a push notification with a device token to a user authentication device, which is separate from the user device, for requesting verification of the user authentication device, the user device receiving the device token sent from the user authentication device for server verification, a user authentication server receiving the device token from the user device after the user is verified by the user authentication device; determining if the user authentication device is within a defined vicinity of the user; providing a user authentication if the password provided with the request for authentication matches the master password associated with the user and the user authentication device associated with the user is within a defined vicinity of the user; and
,providing, on a display of the user device, an access screen of a secured application. - View Dependent Claims (29, 30, 31, 32)
-
Specification