Communication authentication using multiple communication media
First Claim
1. A method of authenticating a first individual for communication with a second individual, the method comprising:
- receiving, on a first communication device, a first communication from the first individual via a first communication medium;
rejecting the first communication;
after rejecting the first communication, providing the first individual with information for communicating with the second individual via a second communication medium;
receiving, on the first communication device or a second communication device, a second communication from the first individual via the second communication medium; and
authenticating the first individual for communication with the second individual via at least one of the first and second communication medium.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides a method, system, and program product for authenticating a first individual for communication with a second individual. In one embodiment, the invention includes receiving a first communication from the first individual via a first communication medium, rejecting the first communication, providing the first individual with information for communicating with the second individual via a second communication medium, receiving a second communication from the first individual via the second communication medium, and authenticating the first individual for communication with the second individual via at least one of the first and second communication medium.
-
Citations
20 Claims
-
1. A method of authenticating a first individual for communication with a second individual, the method comprising:
-
receiving, on a first communication device, a first communication from the first individual via a first communication medium; rejecting the first communication; after rejecting the first communication, providing the first individual with information for communicating with the second individual via a second communication medium; receiving, on the first communication device or a second communication device, a second communication from the first individual via the second communication medium; and authenticating the first individual for communication with the second individual via at least one of the first and second communication medium. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
at least one computing device configured for authenticating a first individual for communication with a second individual by performing a method comprising; receiving a first communication from the first individual via a first communication medium; rejecting the first communication; after rejecting the first communication, providing the first individual with information for communicating with the second individual via a second communication medium; receiving a second communication from the first individual via the second communication medium; and authenticating the first individual for communication with the second individual via at least one of the first and second communication medium. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A program product stored on a non-transitory computer-readable storage medium, which when executed, is operable to authenticate a first individual for communication with a second individual by performing a method comprising:
-
receiving a first communication from the first individual via a first communication medium; rejecting the first communication; after rejecting the first communication, providing the first individual with information for communicating with the second individual via a second communication medium; receiving a second communication from the first individual via the second communication medium; and authenticating the first individual for communication with the second individual via at least one of the first and second communication medium. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A method for deploying an application for authenticating a first individual for communication with a second individual, comprising:
providing a computer infrastructure being operable to; receive a first communication from the first individual via a first communication medium; reject the first communication; after the first communication is rejected, provide the first individual with information for communicating with the second individual via a second communication medium; receive a second communication from the first individual via the second communication medium; and authenticate the first individual for communication with the second individual via at least one of the first and second communication medium.
Specification