Systems and methods for authentication and verification
First Claim
1. A method of using a computer system to authenticate a user seeking to conduct at least one interaction with a secured capability provided by a computer, the method comprising:
- using the computer system to access a first identifier corresponding to the secured capability, the first identifier assigned to be used by the secured capability for a finite period of time;
using the computer system to send a second identifier to an electronic device being used by the user, the second identifier corresponding to the secured capability;
using the computer system to receive a signal from the electronic device being used by the user;
using a processor of the computer system to evaluate, based at least on the signal and one or both of the first identifier and the second identifier, whether the user is authorized to conduct the at least one interaction with the secured capability; and
in response to an indication from the processor that the user is authorized to conduct the at least one interaction with the secured capability, using the computer system to generate authorization information and to provide the authorized information to at least one of the electronic device and the computer providing the secured capability.
2 Assignments
0 Petitions
Accused Products
Abstract
Computer systems and methods are provided for authenticating a user seeking to conduct at least one interaction with a secured capability provided by a computer. The method includes accessing a first identifier corresponding to the secured capability and sending a second identifier to an electronic device being used by the user. The second identifier corresponds to the secured capability. The method further includes receiving a signal from the electronic device being used by the user. The method further includes using a processor to evaluate, based at least on the signal and one or both of the first identifier and the second identifier, whether the user is authorized to conduct the at least one interaction with the secured capability.
-
Citations
31 Claims
-
1. A method of using a computer system to authenticate a user seeking to conduct at least one interaction with a secured capability provided by a computer, the method comprising:
-
using the computer system to access a first identifier corresponding to the secured capability, the first identifier assigned to be used by the secured capability for a finite period of time; using the computer system to send a second identifier to an electronic device being used by the user, the second identifier corresponding to the secured capability; using the computer system to receive a signal from the electronic device being used by the user; using a processor of the computer system to evaluate, based at least on the signal and one or both of the first identifier and the second identifier, whether the user is authorized to conduct the at least one interaction with the secured capability; and in response to an indication from the processor that the user is authorized to conduct the at least one interaction with the secured capability, using the computer system to generate authorization information and to provide the authorized information to at least one of the electronic device and the computer providing the secured capability. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A computer system for authenticating users seeking to conduct interactions with a plurality of secured capabilities provided by a plurality of computers, each computer of the plurality of computers providing at least one secured capability of the plurality of secured capabilities, the computer system comprising:
-
at least one input configured to access a plurality of first identifiers, each first identifier of the plurality of first identifiers corresponding to a secured capability of the plurality of secured capabilities; at least one output configured to send a plurality of second identifiers to a plurality of electronic devices being used by the users, each second identifier of the plurality of second identifiers corresponding to a secured capability of the plurality of secured capabilities, the at least one input further configured to receive a signal from the plurality of electronic devices being used by the users; a storage device comprising; a first association of each secured capability of the plurality of secured capabilities with at least one corresponding first or second identifier; and a second association of verification data with corresponding verified users authorized to access at least one secured capability of the plurality of secured capabilities; a processor configured to evaluate, based at least on the signal and one or both of a first identifier of the plurality of first identifiers and a second identifier of the plurality of second identifiers, whether a user of the electronic device is authorized to conduct at least one interaction with a secured capability provided by the computer, the processor further configured to generate authorization information if the user of the electronic device is authorized to conduct the at least one interaction with the secured capability and to provide the authorized information to at least one of the electronic device and the computer providing the secured capability.
-
-
25. A non-transitory computer storage having stored thereon a computer program that instructs a computer system to authenticate a user seeking to conduct at least one interaction with a secured capability provided by a computer by at least:
-
using the computer system to access a first identifier corresponding to the secured capability, the first identifier assigned to be used by the secured capability for a finite period of time; using the computer system to send a second identifier to an electronic device being used by the user, the second identifier corresponding to the secured capability; using the computer system to receive a signal from the electronic device being used by the user; using a processor of the computer system to evaluate, based at least on the signal and one or both of the first identifier and the second identifier, whether the user is authorized to conduct the at least one interaction with the secured capability; and in response to an indication from the processor that the user is authorized to conduct the at least one interaction with the secured capability, using the computer system to generate authorization information and to provide the authorized information to at least one of the electronic device and the computer providing the secured capability.
-
-
26. A method of using a computer system to authenticate a user seeking to conduct at least one interaction with a secured capability provided by a computer, the method comprising:
-
using the computer system to access a first identifier corresponding to the secured capability; using the computer system to push a second identifier to an electronic device being used by the user, the second identifier corresponding to the secured capability and pushed to the electronic device via a push notification service; using the computer system to receive a signal from the electronic device being used by the user; using a processor of the computer system to evaluate, based at least on the signal and one or both of the first identifier and the second identifier, whether the user is authorized to conduct the at least one interaction with the secured capability; and in response to an indication from the processor that the user is authorized to conduct the at least one interaction with the secured capability, using the computer system to generate authorization information comprising information that is unique to the user and to provide the authorized information to at least one of the electronic device and the computer providing the secured capability. - View Dependent Claims (27, 28)
-
-
29. A method of using a computer system to authenticate a user seeking to conduct at least one interaction with a secured capability provided by a computer, the method comprising:
-
using the computer system to access a first identifier corresponding to the secured capability; using the computer system to send a second identifier to an electronic device being used by the user, the Second identifier comprising corresponding to the secured capability, at least one of the first identifier and the second identifier assigned to be used by the secured capability for a finite period of time; using the computer system to receive a signal from the electronic device being used by the user; using a processor of the computer system to evaluate, based at least on the signal and one or both of the first identifier and the second identifier, whether the user is authorized to conduct the at least one interaction with the secured capability; and in response to an indication from the processor that the user is authorized to conduct the at least one interaction with the secured capability, using the computer system to generate authorization information and to provide the authorized information to at least one of the electronic device and the computer providing the secured capability. - View Dependent Claims (30, 31)
-
Specification