Mobile security fob
First Claim
Patent Images
1. A computer-implemented method of enrolling a mobile device for secondary multifactor authentication, the method comprising:
- receiving from a primary factor authentication device by one or more computer systems, a request to enroll a mobile device as a secondary factor authentication device;
receiving from the mobile device by the one or more computers, a unique device identifier,wherein receiving the unique device identifier triggers generating by the one or more computers, a pairing instruction for the primary factor authentication device to cause the primary factor authentication device to automatically establish a direct connection to the mobile device, which pairing instruction includes information that causes the primary factor authentication device to execute a pairing operation with the mobile device;
transmitting by the one or more computers, the pairing instruction to the primary factor authentication device; and
enrolling by the one or more computer systems the mobile device as a secondary factor authentication device for the primary factor authentication device.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method comprising: receiving, from a primary factor authentication device by one or more computer systems, a request to enroll a mobile device as a secondary factor authentication device; and
- enrolling by the one or more computer systems the mobile device as a first, secondary factor authentication device.
31 Citations
20 Claims
-
1. A computer-implemented method of enrolling a mobile device for secondary multifactor authentication, the method comprising:
-
receiving from a primary factor authentication device by one or more computer systems, a request to enroll a mobile device as a secondary factor authentication device; receiving from the mobile device by the one or more computers, a unique device identifier, wherein receiving the unique device identifier triggers generating by the one or more computers, a pairing instruction for the primary factor authentication device to cause the primary factor authentication device to automatically establish a direct connection to the mobile device, which pairing instruction includes information that causes the primary factor authentication device to execute a pairing operation with the mobile device; transmitting by the one or more computers, the pairing instruction to the primary factor authentication device; and enrolling by the one or more computer systems the mobile device as a secondary factor authentication device for the primary factor authentication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 17)
-
-
8. A computer program product tangibly stored on a computer readable storage device, the computer program product comprising instructions for causing a computer system to:
-
receive from a primary factor authentication device, a request to enroll a mobile device as a secondary factor authentication device; receive from the mobile device a unique device identifier, wherein receiving the unique device identifier triggers generating a pairing instruction for the primary factor authentication device to cause the primary factor authentication device to automatically establish a direct connection to the mobile device, which pairing instruction includes information that causes the primary factor authentication device to execute a pairing operation with the mobile device; transmit the pairing instruction to the primary factor authentication device; and enroll the mobile device as a secondary factor authentication device for the primary factor authentication device. - View Dependent Claims (10, 11, 12, 18)
-
-
9. An apparatus comprising:
-
a processor; memory coupled to the processor; and a storage medium storing a computer program for causing the processor to; receive from a primary factor authentication device, a request to enroll a mobile device as a secondary factor authentication device; receive from the mobile device a unique device identifier, wherein receiving the unique device identifier triggers generating a pairing instruction for the primary factor authentication device to cause the primary factor authentication device to automatically establish a direct connection to the mobile device, which pairing instruction includes information that causes the primary factor authentication device to execute a pairing operation with the mobile device; transmit the pairing instruction to the primary factor authentication device; and enroll the mobile device as a secondary factor authentication device for the primary factor authentication device. - View Dependent Claims (13, 14, 15, 19)
-
-
16. A system comprises:
-
a business processor computer system, comprising one or more processors and memory coupled to the processors; and a storage medium storing a computer program product for causing the business processor computer system to; receive from a primary factor authentication device, a request to enroll a mobile device as a secondary factor authentication device; receive from the mobile device a unique device identifier, wherein receiving the unique device identifier triggers generating a pairing instruction for the primary factor authentication device to cause the primary factor authentication device to automatically establish a direct connection to the mobile device, which pairing instruction includes information that causes the primary factor authentication device to execute a pairing operation with the mobile device; transmit the pairing instruction to the primary factor authentication device; and enroll the mobile device as a secondary factor authentication device for the primary factor authentication device; and an authentication computer system, comprising one or more processors and memory coupled to the processors; and a storage medium storing a computer program product for causing the an authentication computer system to; receive a key code from the mobile device; validate that key code is a valid key code generated by the business processor computer system, by comparing the received key code to other key codes previously received from the business processor computer system; and store the device ID for mobile device and key in a data repository; and generate an association between the device ID and the key. - View Dependent Claims (20)
-
Specification