User authentication based on FOB/indicia scan
First Claim
1. A computer apparatus for authenticating a user, the apparatus comprising:
- a non-transitory memory;
a computer processor; and
a module stored in the memory, executable by the processor, and configured to cause the processor to;
receive a first request from a user to access at least one first function associated with a first application;
determine that access to the at least one first function requires user authentication;
initiate sensing of an authentication validating carrier comprising a first credential;
determine the first credential based at least in part on the sensed authentication validating carrier;
validate the first credential, thereby resulting in a first successful user authentication;
grant access to the at least one first function associated with the first application based at least in part on the first successful user authentication, wherein the access to at least one first function associated with the first application expires after an occurrence of an expiration event, wherein the expiration event is at least one of a lapse of a period of time, an event associated with a third party application, an event associated with an operating system, and a user-initiated event;
receive a second request from the user for access to at least one second function associated with a second application;
determine that access to at least one second function associated with the second application requires user authentication;
receive a second credential from the user;
validate the second credential, thereby resulting in a second successful user authentication; and
grant access to the at least one second function associated with the second application based on the second successful user authentication.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one function associated with a first application; determining that access to at least one function requires user authentication; initiating sensing of an authentication validating carrier comprising a first credential; determining the first credential based at least in part on the sensed authentication validating carrier; validating the first credential, thereby resulting in a first successful user authentication; and granting access to at least one function associated with the first application based on the validation of the first successful user authentication.
169 Citations
16 Claims
-
1. A computer apparatus for authenticating a user, the apparatus comprising:
-
a non-transitory memory; a computer processor; and a module stored in the memory, executable by the processor, and configured to cause the processor to; receive a first request from a user to access at least one first function associated with a first application; determine that access to the at least one first function requires user authentication; initiate sensing of an authentication validating carrier comprising a first credential; determine the first credential based at least in part on the sensed authentication validating carrier; validate the first credential, thereby resulting in a first successful user authentication; grant access to the at least one first function associated with the first application based at least in part on the first successful user authentication, wherein the access to at least one first function associated with the first application expires after an occurrence of an expiration event, wherein the expiration event is at least one of a lapse of a period of time, an event associated with a third party application, an event associated with an operating system, and a user-initiated event; receive a second request from the user for access to at least one second function associated with a second application; determine that access to at least one second function associated with the second application requires user authentication; receive a second credential from the user; validate the second credential, thereby resulting in a second successful user authentication; and grant access to the at least one second function associated with the second application based on the second successful user authentication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for authenticating a user, the method comprising:
-
receiving, by a computer processor, a request from a user to access at least one first function associated with a first application; determining, by a computer processor, that access to the at least one first function requires user authentication; initiating sensing, by a computer processor, of an authentication validating carrier comprising a firsts credential; determining, by a computer processor, the first credential based at least in part on the sensed authentication validating carrier; validating, by a computer processor, the first credential, thereby resulting in a first successful user authentication; granting access, by a computer processor, to the at least one first function associated with the first application based at least in part on the first successful user authentication, wherein the access to at least one first function associated with the first application expires after an occurrence of an expiration event, wherein the expiration event is at least one of a lapse of a period of time, an event associated with a third party application, an event associated with an operating system, and a user-initiated event; receiving, by a computer processor, a second request from the user for access to at least one second function associated with a second application; determining, by a computer processor, that access to at least one second function associated with the second application requires user authentication; receiving, by a computer processor, a second credential from the user; validating, by a computer processor, the second credential, thereby resulting in a second successful user authentication; and granting access, by a computer processor, to the at least one second function associated with the second application based on the second successful user authentication.
-
-
16. A computer program product for authenticating a user, the computer program product comprising:
-
a non-transitory computer-readable medium comprising; a first set of codes for receiving a request from a user for access to at least one first function associated with a first application; a second set of codes for determining that access to the at least one first function requires user authentication; a third set of codes for initiating sensing of an authentication validating carrier comprising a first credential; a fourth set of codes for determining the first credential based at least in part on the sensed authentication validating carrier; a fifth set of codes for validating the first credential, thereby resulting in a first successful user authentication; and a sixth set of codes for granting access to the at least one first function associated with the first application based at least in part on the successful user authentication, wherein the access to at least one first function associated with the first application expires after an occurrence of an expiration event, wherein the expiration event is at least one of a lapse of a period of time, an event associated with a third party application, an event associated with an operating system, and a user-initiated event; a seventh set of codes for receiving a second request from the user for access to at least one second function associated with a second application; an eighth set of codes for determining that access to at least one second function associated with the second application requires user authentication; a ninth set of codes for receiving a second credential from the user; a tenth set of codes for validating the second credential, thereby resulting in a second successful user authentication; and an eleventh set of codes for granting access to the at least one second function associated with the second application based on the second successful user authentication.
-
Specification