Systems and methods for authenticating a user of a computer application, network, or device using a wireless device
First Claim
1. A method for authenticating a previously registered user of an application requiring secure access to the application using a mobile access point, a computerized authentication system, and a wireless device associated with the user, the method comprising:
- providing an invocation element on one or more of the wireless device or the mobile access point, the invocation element capable of being activated by a single user action;
receiving an indication at the computerized authentication system that the invocation element has been activated;
obtaining a location of the wireless device;
determining whether the wireless device is associated with an authorized user based on a previously registered association between a wireless device identifier associated with the wireless device and an application identifier associated with the application using the computerized authentication system;
approving the user to use the application using the computerized authentication system based on a predetermined location criterion related to one or more of the obtained wireless device location or a location of the mobile access point, when the wireless device is associated with an authorized user; and
producing an indication on one or more of the mobile access point or the wireless device that the user has been authenticated when the user was approved using the computerized authentication system.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user includes providing an invocation element capable of being activated by a single user action, receiving an indication that the invocation element has been activated, obtaining a location of a wireless device associated with the user, determining whether the wireless device is associated with an authorized user, approving the user to use the application based on a predetermined location criterion, and producing an indication that the user has been authenticated.
-
Citations
20 Claims
-
1. A method for authenticating a previously registered user of an application requiring secure access to the application using a mobile access point, a computerized authentication system, and a wireless device associated with the user, the method comprising:
-
providing an invocation element on one or more of the wireless device or the mobile access point, the invocation element capable of being activated by a single user action; receiving an indication at the computerized authentication system that the invocation element has been activated; obtaining a location of the wireless device; determining whether the wireless device is associated with an authorized user based on a previously registered association between a wireless device identifier associated with the wireless device and an application identifier associated with the application using the computerized authentication system; approving the user to use the application using the computerized authentication system based on a predetermined location criterion related to one or more of the obtained wireless device location or a location of the mobile access point, when the wireless device is associated with an authorized user; and producing an indication on one or more of the mobile access point or the wireless device that the user has been authenticated when the user was approved using the computerized authentication system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computerized authentication system for authenticating a previously registered user of an application requiring secure access to the application using a mobile access point and a wireless device associated with the user, the computerized authentication system comprising:
-
invocation element means for providing an invocation element capable of being activated by a single user action on one or more of the wireless device or the mobile access point; indicator receiving means for receiving an indication at the authentication system that the invocation element has been activated; location obtaining means for obtaining a location of the wireless device; association means for determining whether the wireless device is associated with an authorized user based on a previously registered association between a wireless device identifier associated with the wireless device and an application identifier associated with the application; approving means for approving the user to use the application based on a predetermined location criterion related to one or more of the obtained wireless device location or a location of the mobile access point, when the wireless device is associated with an authorized user; and indication means for producing an indication on one or more of the mobile access point or the wireless device that the user has been authenticated when the user was approved. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A system for authenticating a previously registered user of an application requiring secure access to the application using a mobile access point in data communication with the application and a wireless device associated with the user, the system comprising:
-
a memory; and a processor in data communication with the memory, the mobile access poiand the wireless device, wherein the processor is configured to; provide an invocation element capable of being activated by a single user action on one or more of the wireless device or the mobile access point; receive an indication that the invocation element has been activated; obtain a location of the wireless device; determine whether the wireless device is associated with an authorized user based on a previously registered association between a wireless device identifier associated with the wireless device and an application identifier associated with the application; approve the user to use the application based on a predetermined location criterion related to one or more of the obtained wireless device location or a location of the mobile access point, when the wireless device is associated with an authorized user; and produce an indication on one or more of the mobile access point or the wireless device that the user has been authenticated when the user was approved.
-
Specification