Methods and apparatus for rules-based multi-factor verification
First Claim
1. A method comprising:
- receiving, at a verification platform from a first device, a verification request, the verification platform being adapted for communication with a verification application running on the first device;
identifying, at the verification platform, one or more verification rules previously established by a user of the first device for processing of the verification request;
sending, from the verification platform to the first device, a notification regarding said one or more verification rules;
receiving, at the verification platform from the first device, verification input responsive to the notification;
granting or denying the verification request, at the verification platform, based at least in part on the received verification input;
wherein said one or more verification rules specify multiple distinct types of verification selected by the user and a sequence in which the selected types of verification are to be applied in processing the verification request;
permitting the user via the verification application to designate one or more additional applications on the first device as protected applications;
permitting the user via the verification application to designate respective distinct sets of one or more verification rules to be applied before access is granted to the protected applications;
generating the verification request in conjunction with an attempted launch of a given one of the protected applications on the first device; and
applying the sequence of the selected types of verification, the sequence comprising multiple security levels in which each such level requires satisfaction of at least one of the selected types of verification;
wherein a given one of the security levels comprises a primary type of verification and at least one fallback type of verification to be used in the event that the primary type of verification fails, the at least one fallback type of verification involving utilization of a second device distinct from the first device.
10 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a verification platform is adapted for communication with at least a first device. The verification platform receives a verification request from the first device, identifies one or more verification rules previously established by a user of the first device for processing of the verification request, sends a notification regarding the one or more verification rules, receives verification input responsive to the notification, and grants or denies the verification request based at least in part on the received verification input. The verification rule or rules specify multiple distinct types of verification selected by the user, and a sequence in which the selected verification types are to be applied in processing the verification request. The verification request may be generated in conjunction with an attempted launch of a designated application on the first device. The first device may comprise a mobile telephone, a computer or another type of device.
210 Citations
20 Claims
-
1. A method comprising:
-
receiving, at a verification platform from a first device, a verification request, the verification platform being adapted for communication with a verification application running on the first device; identifying, at the verification platform, one or more verification rules previously established by a user of the first device for processing of the verification request; sending, from the verification platform to the first device, a notification regarding said one or more verification rules; receiving, at the verification platform from the first device, verification input responsive to the notification; granting or denying the verification request, at the verification platform, based at least in part on the received verification input; wherein said one or more verification rules specify multiple distinct types of verification selected by the user and a sequence in which the selected types of verification are to be applied in processing the verification request; permitting the user via the verification application to designate one or more additional applications on the first device as protected applications; permitting the user via the verification application to designate respective distinct sets of one or more verification rules to be applied before access is granted to the protected applications; generating the verification request in conjunction with an attempted launch of a given one of the protected applications on the first device; and applying the sequence of the selected types of verification, the sequence comprising multiple security levels in which each such level requires satisfaction of at least one of the selected types of verification; wherein a given one of the security levels comprises a primary type of verification and at least one fallback type of verification to be used in the event that the primary type of verification fails, the at least one fallback type of verification involving utilization of a second device distinct from the first device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An article of manufacture comprising a non-transitory processor-readable storage medium having embodied therein one or more software programs, wherein the one or more software programs when executed by at least one processing device cause the at least one processing device:
-
to receive, at a verification platform from a first device, a verification request, the verification platform being adapted for communication with a verification application running on the first device; to identify, at the verification platform, one or more verification rules previously established by a user of the first device for processing of the verification request; to send, from the verification platform to the first device, a notification regarding said one or more verification rules; to receive, at the verification platform from the first device, verification input responsive to the notification; to grant or deny the verification request, at the verification platform, based at least in part on the received verification input; wherein said one or more verification rules specify multiple distinct types of verification selected by the user and a sequence in which the selected types of verification are to be applied in processing the verification request; to permit the user via the verification application to designate one or more additional applications on the first device as protected applications; to permit the user via the verification application to designate respective distinct sets of one or more verification rules to be applied before access is granted to the protected applications; to generate the verification request in conjunction with an attempted launch of a given one of the protected applications on the first device; and to apply the sequence of the selected types of verification, the sequence comprising multiple security levels in which each such level requires satisfaction of at least one of the selected types of verification; wherein a given one of the security levels comprises a primary type of verification and at least one fallback type of verification to be used in the event that the primary type of verification fails, the at least one fallback type of verification involving utilization of a second device distinct from the first device. - View Dependent Claims (15)
-
-
16. An apparatus comprising:
-
a verification platform comprising at least one processing device having a processor coupled to a memory, the verification platform being adapted for communication with a verification application on a first device; wherein the verification platform is configured; to receive a verification request from the verification application on the first device; to identify one or more verification rules previously established by a user of the first device for processing of the verification request; to send, to the first device, a notification regarding said one or more verification rules; to receive, from the first device, verification input responsive to the notification; and to grant or deny the verification request based at least in part on the received verification input; wherein said one or more verification rules specify multiple distinct types of verification selected by the user and a sequence in which the selected types of verification are to be applied in processing the verification request; wherein the verification platform is further configured; to permit the user via the verification application to designate one or more additional applications on the first device as protected applications; to permit the user via the verification application to designate respective distinct sets of one or more verification rules to be applied before access is granted to the protected applications; to generate the verification request in conjunction with an attempted launch of a given one of the protected applications on the first device; and to apply the sequence of the selected types of verification, the sequence comprising multiple security levels in which each such level requires satisfaction of at least one of the selected types of verification; wherein a given one of the security levels comprises a primary type of verification and at least one fallback type of verification to be used in the event that the primary type of verification fails, the at least one fallback type of verification involving utilization of a second device distinct from the first device. - View Dependent Claims (17, 18, 19)
-
-
20. A method comprising:
-
sending, from a first device to a verification platform external to the first device, information characterizing one or more verification rules, said one or more verification rules being established by a user of the first device, the verification platform being adapted for communication with a verification application on the first device; sending, from the first device to the verification platform, a verification request; receiving, at the first device from the verification platform, a notification regarding said one or more verification rules; sending, from the first device to the verification platform, verification input responsive to the notification; wherein the verification platform grants or denies the verification request based at least in part on the verification input; wherein said one or more verification rules specify multiple distinct types of verification selected by a user and a sequence in which the selected types of verification are to be applied in processing the verification request; permitting the user via the verification application to designate one or more additional applications on the first device as protected applications; permitting the user via the verification application to designate respective distinct sets of one or more verification rules to be applied before access is granted to the protected applications; generating the verification request in conjunction with an attempted launch of a given one of the protected applications on the first device; and applying the sequence of the selected types of verification, the sequence comprising multiple security levels in which each such level requires satisfaction of at least one of the selected types of verification; wherein a given one of the security levels comprises a primary type of verification and at least one fallback type of verification to be used in the event that the primary type of verification fails, the at least one fallback type of verification involving utilization of a second device distinct from the first device.
-
Specification