Secure authentication mechanism using quick response codes
First Claim
1. A computer system for securing authentication of a user'"'"'s identity comprising a computer comprising at least one processor, one or more memories, one or more computer readable storage media having program instructions executable by the computer to perform the program instructions comprising:
- receiving, by the computer, initiation of a transaction from a user;
searching, by the computer, for associated information of the user;
choosing, by the computer, an authentication query requiring input from the user based on the associated information;
generating, by the computer, a visual code representing the authentication query;
splitting, by the computer, the visual code into pieces; and
sending, by the computer, each piece of visual code to the user via a separate communication channel.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of securing authentication of a user'"'"'s identity is disclosed. The method comprises the steps of: an authentication program of an entity receiving initiation of a transaction from a user; the authentication program searching for associated information of the user; the authentication program choosing an authentication query requiring input from the user based on the associated information; the authentication program generating a visual code representing the authentication query; the authentication program splitting the visual code into pieces; and the authentication program sending each piece of visual code to the user via a separate communication channel. A method of securing authentication of a user'"'"'s identity with an entity is also disclosed.
-
Citations
15 Claims
-
1. A computer system for securing authentication of a user'"'"'s identity comprising a computer comprising at least one processor, one or more memories, one or more computer readable storage media having program instructions executable by the computer to perform the program instructions comprising:
-
receiving, by the computer, initiation of a transaction from a user; searching, by the computer, for associated information of the user; choosing, by the computer, an authentication query requiring input from the user based on the associated information; generating, by the computer, a visual code representing the authentication query; splitting, by the computer, the visual code into pieces; and sending, by the computer, each piece of visual code to the user via a separate communication channel. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for securing authentication of a user'"'"'s identity with an entity comprising a device computer comprising at least one processor, one or more memories, one or more computer readable storage media, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by the device computer to perform a method comprising:
-
receiving, by the device computer, a plurality of visual code pieces through different communication channels; reassembling, by the device computer, the visual code from the plurality of visual code pieces; obtaining, by the device computer, the authentication query from the reassembled visual code and providing the authentication query to the user for input; and receiving, by the device computer, a response from the user in response to the authentication query. - View Dependent Claims (9, 10, 11)
-
-
12. A computer system for securing authentication of a user'"'"'s identity with an entity comprising a computer comprising at least one processor, one or more memories, one or more computer readable storage media having program instructions executable by the computer to perform the program instructions comprising:
-
receiving, by the device computer, a plurality of visual code pieces through different communication channels; reassembling, by the device computer, the visual code from the plurality of visual code pieces; obtaining, by the device computer, the authentication query from the reassembled visual code and providing the authentication query to the user for input; and receiving, by the device computer, a response from the user in response to the authentication query. - View Dependent Claims (13, 14, 15)
-
Specification