×

Method for peer to peer mobile context authentication

  • US 9,754,097 B2
  • Filed: 02/02/2015
  • Issued: 09/05/2017
  • Est. Priority Date: 02/21/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-based method of authenticating a first user on a primary electronic data processing unit to a second user on a secondary electronic data processing unit, the steps comprising:

  • providing a server, said server comprises a memory;

    providing the primary electronic data processing unit, the primary electronic data processing unit comprising a first application;

    providing the secondary electronic data processing unit, the secondary electronic data processing unit comprising a second application;

    providing an intermediate host, said intermediate host comprising a presentation, said intermediate host is networked with said primary electronic data processing unit and said second electronic data processing unit;

    initiating a direct connection between said primary electronic data processing unit and said secondary electronic data processing unit;

    creating, by said first application, one or more tagged resources associated with an authentication request object;

    sending, by said server, to said secondary electronic data processing unit the one or more tagged resources;

    presenting said one or more tagged resources to said secondary electronic data processing unit application;

    creating by said server, a first template and a second template in said memory;

    processing, by said server, said first template;

    processing, by said secondary electronic data processing unit, said second template;

    presenting, by said intermediate host via a second channel, said one or more tagged resources to said secondary electronic data processing unit;

    retrieving, by said secondary electronic data processing unit, said second template by following said one or more tagged resources, utilizing said secondary electronic data processing unit application to retrieve said second template independently of said server via a third channel, said third channel separate from said second channel;

    interrogating, by said server, a plurality of first contextual factors;

    populating, by said server, said first template based on said plurality of first contextual factors;

    constructing a one-time contextual server signature by said server based on said first template;

    interrogating, by said secondary electronic data processing unit application, a plurality of second contextual factors from a perspective of said secondary electronic data processing unit;

    populating, by said secondary electronic data processing unit application, said second template based on said plurality of second contextual factors;

    constructing, by said secondary electronic data processing unit application, a one-time contextual application signature based on said second template; and

    responsive to determining, by said server, said one-time contextual application signature matching said one-time contextual server signature;

    authenticating and granting access to the first user, and responsive to determining, by said server, said one-time contextual application signature failing to match said one-time contextual server signature;

    denying access to the first user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×