Computer-implemented method for mobile authentication and corresponding computer system
First Claim
1. A non-transitory computer-readable medium storing a program executable by one or more processors of a first computing device, the program comprising sets of instructions for:
- receiving, by the first computing device, from a second computing device a login request to log into an account associated with a service hosted on the first computing device;
sending from the first computing device to a third computing device an authentication request to authenticate a user associated with the account;
receiving, by the first computing device, from the third computing device authentication information for logging into the account associated with the service, wherein the authentication information is based on a first information the third computing device receives from a personal smart card and a second information the third computing device receives from a mobile computing device, the first and second information configured for authenticating the user associated with the account; and
logging into the account associated with the service based on the authentication information in order to allow the user to access the account from the second computing device.
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment of the present invention a computerized method includes receiving at a personal-mobile device a first communication, which includes information for requesting user verification for logging into an account of a user, via a computing device. The account is with a service provided by an application server. The method includes starting a personal-authentication application on the personal-mobile device in response to receiving the first communication, and receiving in the personal-authentication application a user verification for confirming logging into the account. The method includes logging into the account via the computing device based on receipt of the user verification. Embodiments of the present invention provide enhanced security for logging into an account that a user may have with a service by providing that a personal-mobile device, such as a mobile telephone, which is personal to a user, is configured as a security token for login to the account.
12 Citations
18 Claims
-
1. A non-transitory computer-readable medium storing a program executable by one or more processors of a first computing device, the program comprising sets of instructions for:
-
receiving, by the first computing device, from a second computing device a login request to log into an account associated with a service hosted on the first computing device; sending from the first computing device to a third computing device an authentication request to authenticate a user associated with the account; receiving, by the first computing device, from the third computing device authentication information for logging into the account associated with the service, wherein the authentication information is based on a first information the third computing device receives from a personal smart card and a second information the third computing device receives from a mobile computing device, the first and second information configured for authenticating the user associated with the account; and logging into the account associated with the service based on the authentication information in order to allow the user to access the account from the second computing device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A first computing device comprising:
-
one or more processors; a non-transitory computer-readable medium storing a program executable by the one or more processors, the program comprising sets of instructions for; receiving, by the first computing device, from a second computing device a login request to log into an account associated with a service hosted on the first computing device; sending from the first computing device to a third computing device an authentication request to authenticate a user associated with the account; receiving, by the first computing device, from the third computing device authentication information for logging into the account associated with the service, wherein the authentication information is based on a first information the third computing device receives from a personal smart card and a second information the third computing device receives from a mobile computing device, the first and second information configured for authenticating the user associated with the account; and logging into the account associated with the service based on the authentication information in order to allow the user to access the account from the second computing device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
receiving, by a first computing device, from a second computing device a login request to log into an account associated with a service hosted on the first computing device; sending from the first computing device to a third computing device an authentication request to authenticate a user associated with the account; receiving, by the first computing device, from the third computing device authentication information for logging into the account associated with the service, wherein the authentication information is based on a first information the third computing device receives from a personal smart card and a second information the third computing device receives from a mobile computing device, the first and second information configured for authenticating the user associated with the account; and logging into the account associated with the service based on the authentication information in order to allow the user to access the account from the second computing device. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification