Extended security for wireless device handset authentication
First Claim
1. A method, comprising:
- receiving login information from an agent on a computing device;
determining from the login information that a valid account exists and is related to a mobile device;
performing a proximity check between the mobile device and the computing device after the valid account is determined, the proximity check including;
sending a message with user instructions to the mobile device via a first network, andreceiving a reply including a correct answer based on the user instructions of the message via a second network, the correct answer being different than the user instructions; and
providing authorization to the agent to approve an exchange of data with an application on the computing device when the mobile device is determined by the proximity check as proximate to the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A mobile device is related to a user account. An agent implemented as processor instructions on a computing device sends login information to a service provider server. The service provider server compares the login information to the user account, performs a proximity check of the mobile device and the computing device, and sends authorization to the agent to approve an exchange of data with an application on the computing device. In some implementations the service provider may be an authorization service provider. Alternatively the service provider may be a wireless communications service provider and the mobile device is a cellular phone. In some implementations the mobile device is one of a card or a key fob that may include a biometric reader.
-
Citations
17 Claims
-
1. A method, comprising:
-
receiving login information from an agent on a computing device; determining from the login information that a valid account exists and is related to a mobile device; performing a proximity check between the mobile device and the computing device after the valid account is determined, the proximity check including; sending a message with user instructions to the mobile device via a first network, and receiving a reply including a correct answer based on the user instructions of the message via a second network, the correct answer being different than the user instructions; and providing authorization to the agent to approve an exchange of data with an application on the computing device when the mobile device is determined by the proximity check as proximate to the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method, comprising:
-
receiving by an agent implemented as processor instructions on a computing device login information related to an account; sending by the agent the login information over a packet-switched network to a provider of authorization services; receiving by the agent a response from the authorization service provider requesting a proximity check of a mobile device related to the account, wherein the response includes a message with user instructions; performing by the agent a proximity check between the mobile device and the computing device after receiving the response, the proximity check including;
routing the message with the user instructions to the mobile device via a short range network, andreceiving a reply including a correct answer based on the user instructions of the message from the mobile device via the short range network or from the computing device, the correct answer being different than the user instructions; sending by the agent a notice to the authorization service provider indicating proximity of the mobile device based on the proximity check; and receiving by the agent authorization from the authorization service provider to approve information exchange with an application. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A system, comprising:
-
a mobile device related to a user account; a service provider server; and an agent implemented as processor instructions on a computing device;
wherein the agent is configured to send login information to the service provider server, and wherein the service provider server is configured to;compare the login information to the user account to verify the mobile device, perform a proximity check that includes sending a message with user instructions to the mobile device via a first network, receiving a reply including a correct answer based on the user instructions of the message via a second network, the correct answer being different than the user instructions, and send authorization to the agent to approve an exchange of data with an application on the computing device when the mobile device is determined by the proximity check as proximate to the computing device. - View Dependent Claims (15, 16, 17)
-
Specification