Methods and systems for providing bidirectional authentication
First Claim
1. A method of providing access to a secure computing device, the method comprising:
- receiving, by a security device, a request to generate data for a secure access between a user device and the secure computing device;
generating, by the security device, a one-time password and a unique sequence of symbologies;
transmitting, by the security device, the one-time password, the unique sequence of symbologies and location information to a secure computing device, wherein the location information corresponds to a location of the user device and wherein the one-time password, the unique sequence of symbologies and the location information are configured to provide the secure computing device with an ability to establish bidirectional authentication between the user device and the computing device; and
displaying, by the security device, the one-time password and the unique sequence of symbologies to the user such that the user provides the one-time password to the secure computing device via the user device and receives an authentication sequence of symbologies from the secure computing device in response, wherein the bidirectional authentication is established when the user device confirms the unique sequence of symbologies matches the authenticating sequence of symbologies.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for providing access to a secure computing device are disclosed. A security device is used to generate a one-time password, a sequence of symbologies, and location information. The security device transmits the password, sequence and location information to the secure computing device for storage and displays the password and sequence to a user. A user device provides a password to the secure computing device in order to obtain access. The secure computing device compares the password with the stored one-time password to verify the user of the user device and sends the sequence to the user device in response. The user or user device verifies the sequence of symbologies to confirm the secure access. The location information may be used to detect fraudulent accesses to the user account.
52 Citations
18 Claims
-
1. A method of providing access to a secure computing device, the method comprising:
-
receiving, by a security device, a request to generate data for a secure access between a user device and the secure computing device; generating, by the security device, a one-time password and a unique sequence of symbologies; transmitting, by the security device, the one-time password, the unique sequence of symbologies and location information to a secure computing device, wherein the location information corresponds to a location of the user device and wherein the one-time password, the unique sequence of symbologies and the location information are configured to provide the secure computing device with an ability to establish bidirectional authentication between the user device and the computing device; and displaying, by the security device, the one-time password and the unique sequence of symbologies to the user such that the user provides the one-time password to the secure computing device via the user device and receives an authentication sequence of symbologies from the secure computing device in response, wherein the bidirectional authentication is established when the user device confirms the unique sequence of symbologies matches the authenticating sequence of symbologies. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of establishing bidirectional authentication between a user device and a secure computing device, the method comprising:
-
receiving, at the secure computing device, a one-time password and a unique sequence of symbologies from a security device; displaying, at the secure computing device, the one-time password and the unique sequence of symbologies; receiving, from the user device, another sequence of symbologies verifying that the unique sequence of symbologies matches the another sequence of symbologies; and responsive to verifying that the unique sequence of symbologies matches the another sequence of symbologies, granting, using the secure computing device, secure access to the user device. - View Dependent Claims (7, 8, 9, 10, 11, 17, 18)
-
-
12. A system for establishing bidirectional authentication between a user device and a secure computing device, the system comprising:
-
a processing device; and a processor-readable storage medium in operable communication with the processing device, wherein the processor-readable storage medium contains one or more programming instructions that, when executed, cause the processing device to; receive a request to generate data for a secure access, generate a one-time password and a unique sequence of symbologies, transmit the one-time password, the unique sequence of symbologies and location information to the secure computing device, receive, from the user device, the one-time password, and transmit the unique sequence of symbologies to the user device. - View Dependent Claims (13, 14, 15, 16)
-
Specification