Methods, systems, and products for authentication
First Claim
Patent Images
1. A method, comprising:
- receiving, by a server, an electronic transaction, the electronic transaction associated with a network address;
querying, by the server, an electronic database for the network address associated with the electronic transaction, the electronic database electronically associating authentication procedures and network addresses including the network address associated with the electronic transaction;
identifying, by the server, two authentication procedures from the electronic database that are electronically associated with the network address, a first authentication procedure of the two authentication procedures specifying a first network, and a second authentication procedure of the two authentication procedures specifying a second network;
sending, by the server, a first authentication request via the first network to a device associated with the network address, the first authentication request associated with the first authentication procedure;
sending, by the server, a second authentication request via the second network to the device associated with the network address, the second authentication request associated with the second authentication procedure; and
authenticating, by the server, the electronic transaction in response to a verification of the second authentication procedure.
5 Assignments
0 Petitions
Accused Products
Abstract
Multiple authentication procedures enhance security of Internet transactions. For example, a request is received from a customer to access a service. A first authentication request is sent to the customer for first authentication information. A second authentication request may be sent to the customer for second authentication information. The method then enables the customer to proceed with accessing the service if the second authentication information is received.
96 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a server, an electronic transaction, the electronic transaction associated with a network address; querying, by the server, an electronic database for the network address associated with the electronic transaction, the electronic database electronically associating authentication procedures and network addresses including the network address associated with the electronic transaction; identifying, by the server, two authentication procedures from the electronic database that are electronically associated with the network address, a first authentication procedure of the two authentication procedures specifying a first network, and a second authentication procedure of the two authentication procedures specifying a second network; sending, by the server, a first authentication request via the first network to a device associated with the network address, the first authentication request associated with the first authentication procedure; sending, by the server, a second authentication request via the second network to the device associated with the network address, the second authentication request associated with the second authentication procedure; and authenticating, by the server, the electronic transaction in response to a verification of the second authentication procedure. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
a processor; and a memory device, the memory device storing code, the code when executed causing the processor to perform operations, the operations comprising; receiving a request associated with a transaction, the transaction associated with a device, the device associated with a network address; querying an electronic database for the network address associated with the device, the electronic database electronically associating authentication procedures and network addresses including the network address associated with the device; identifying two authentication procedures from the electronic database that are electronically associated with the network address, a first authentication procedure of the two authentication procedures specifying a first network, and a second authentication procedure of the two authentication procedures specifying a second network; sending a first authentication request via the first network to the device, the first authentication request associated with the first authentication procedure; sending a second authentication request via the second network to the device, the second authentication request associated with the second authentication procedure; and authenticating the transaction in response to a verification of the second authentication procedure. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A memory device storing instructions that when executed cause a processor to perform operations, the operations comprising:
-
receiving a request associated with a transaction, the transaction associated with a device, the device associated with a network address; querying an electronic database for the network address associated with the device, the electronic database electronically associating authentication procedures and network addresses including the network address associated with the device; identifying two authentication procedures in the electronic database that are electronically associated with the network address, a first authentication procedure of the two authentication procedures specifying a first network, and a second authentication procedure of the two authentication procedures specifying a second network; sending a first authentication request via the first network to the device, the first authentication request associated with the first authentication procedure; sending a second authentication request via the second network to the device, the second authentication request associated with the second authentication procedure; and authenticating the transaction in response to a verification of the second authentication procedure. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification