System and method for second factor authentication
First Claim
1. A method of enhanced communication, the method comprising:
- receiving a request for second factor authentication (SFA) generation from a third party, wherein the request comprises information regarding a user and a desired characteristic of the SFA;
generating an SFA token based on at least the received information regarding the user and the desired characteristic of the SFA;
associating the SFA token with an identifier of the user in a repository;
sending the generated SFA token towards a device associated with the user;
receiving either;
a) a request for SFA validation from the third party, wherein the request comprises information regarding the user and the SFA token, orb) a response from the device associated with the user, wherein the response comprises information regarding the user and the SFA token;
performing one or more processing steps to validate the SFA token yielding at least an indicia of validation; and
sending the indicia of validation to the third party;
wherein at least one of the receiving, generating, associating, sending, and performing is accomplished using one or more computers.
1 Assignment
0 Petitions
Accused Products
Abstract
As individuals increasingly engage in different types of transactions they face a growing threat from, possibly among other things, identity theft, financial fraud, information misuse, etc. and the serious consequences or repercussions of same. Leveraging the ubiquitous nature of wireless devices and the popularity of (Short Message Service, Multimedia Message Service, etc.) messaging, an infrastructure that enhances the security of the different types of transactions within which a wireless device user may participate through a Second Factor Authentication facility. The infrastructure may optionally leverage the capabilities of a centrally-located Messaging Inter-Carrier Vendor.
-
Citations
15 Claims
-
1. A method of enhanced communication, the method comprising:
-
receiving a request for second factor authentication (SFA) generation from a third party, wherein the request comprises information regarding a user and a desired characteristic of the SFA; generating an SFA token based on at least the received information regarding the user and the desired characteristic of the SFA; associating the SFA token with an identifier of the user in a repository; sending the generated SFA token towards a device associated with the user; receiving either; a) a request for SFA validation from the third party, wherein the request comprises information regarding the user and the SFA token, or b) a response from the device associated with the user, wherein the response comprises information regarding the user and the SFA token; performing one or more processing steps to validate the SFA token yielding at least an indicia of validation; and sending the indicia of validation to the third party; wherein at least one of the receiving, generating, associating, sending, and performing is accomplished using one or more computers. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for enhanced communication, the system comprising:
-
a memory; and at least one processor coupled to the memory and configured to receive a request for second factor authentication (SFA) generation from a third party, wherein the request comprises information regarding a user and a desired characteristic of the SFA; a first workflow component executing in the processor and configured to generate an SFA token based on the information regarding the user and the desired characteristic of the SFA; a repository configured to associate the SFA token with an identifier of the user; and a second workflow component executing in the processor and configured to validate the SFA token yielding at least an indicia of validation; wherein the processor is further configured to; send the SFA token towards a device associated with the user, receive either (a) a request for SFA validation from the third party, wherein the request comprises information regarding the user and the SFA token, or (b) a response from the device associated with the user, wherein the response comprises information regarding the user and the SFA token, and send the indicia of validation to the third party. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer readable medium containing computer instructions that, when executed by one or more processors, cause the one or more processors to take actions, comprising:
-
receiving a request for second factor authentication (SFA) generation from a third party, wherein the request comprises information regarding a user and a desired characteristic of the SFA; generating an SFA token based on at least the received information regarding the user and the desired characteristic of the SFA; associating the SFA token with an identifier of the user in a repository; sending the generated SFA token towards a device associated with the user; receiving either; a) a request for SFA validation from the third party, wherein the request comprises information regarding the user and the SFA token, or b) a response from the device associated with the user, wherein the response comprises information regarding the user and the SFA token; performing one or more processing steps to validate the SFA token yielding at least an indicia of validation; and sending the indicia of validation to the third party; wherein at least one of the receiving, generating, associating, sending, and performing is accomplished using one or more computers. - View Dependent Claims (12, 13, 14, 15)
-
Specification