×

Multi-user authentication

  • US 9,906,520 B2
  • Filed: 12/02/2015
  • Issued: 02/27/2018
  • Est. Priority Date: 12/02/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method for multi-user authentication, the method comprising:

  • receiving, by one or more computer processors, a first user login;

    determining, by the one or more computer processors, whether at least one additional user login is received, wherein the first user login and the at least one additional user login employ one or more of a multi-factor authentication, and wherein the first user login utilizes a biometric characteristic and the at least one additional user login utilizes a password;

    responsive to determining at least one additional user login is received, receiving, by the one or more computer processors, a first access request to a resource from the first user;

    receiving, by the one or more computer processors, a second access request to the resource from the at least one additional user;

    responsive to receiving the first access request from the first user and the second access request from the at least one additional user, determining, by the one or more computer processors, whether the first user and the at least one additional user are authorized to make the access requests, wherein determining whether the first user and the at least one additional user are authorized includes determining whether the first user and the at least one additional user are located within a pre-defined geographic radius around the resource;

    responsive to receiving the first access request from the first user and the second access request from the at least one additional user, determining, by the one or more computer processors, whether the first access request from the first user and the second access request from the at least one additional user are received as a simultaneous authentication within the pre-defined geographic radius around the resource and within a pre-defined threshold duration of time; and

    responsive to determining the access requests are received as a simultaneous authentication within the pre-defined geographic radius around the resource and within a pre-defined threshold duration of time, authorizing, by the one or more computer processors, the first access request of the first user and the second access request of the at least one additional user.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×