Methods, systems and products for authentication
First Claim
Patent Images
1. A system, comprising:
- a hardware processor; and
a memory device, the memory device storing code, the code when executed causing the hardware processor to perform operations, the operations comprising;
processing an electronic transaction specifying a network address associated with a device;
querying a database to identify two authentication procedures via different access networks, the database electronically associating authentication procedures and network addresses including the network address specified by the electronic transaction, a first authentication procedure of the two authentication procedures specifying the device and a first access network of the different access networks, and a second authentication procedure of the two authentication procedures specifying a different device and a second access network of the different access networks;
sending two authentication requests to authenticate the electronic transaction, a first authentication request of the two authentication requests sent to the device via the first access network of the different access networks, and a second authentication request of the two authentication requests sent to the different device via the second access network of the different access networks;
determining validations of the two authentication procedures via the different access networks; and
authenticating the electronic transaction in response to the validations of the two authentication procedures via the different access networks.
5 Assignments
0 Petitions
Accused Products
Abstract
Multiple authentication procedures enhance security of Internet transactions. For example, a request is received from a customer to access a service. A first authentication request is sent to the customer for first authentication information. A second authentication request may be sent to the customer for second authentication information. The method then enables the customer to proceed with accessing the service if the second authentication information is received.
119 Citations
14 Claims
-
1. A system, comprising:
-
a hardware processor; and a memory device, the memory device storing code, the code when executed causing the hardware processor to perform operations, the operations comprising; processing an electronic transaction specifying a network address associated with a device; querying a database to identify two authentication procedures via different access networks, the database electronically associating authentication procedures and network addresses including the network address specified by the electronic transaction, a first authentication procedure of the two authentication procedures specifying the device and a first access network of the different access networks, and a second authentication procedure of the two authentication procedures specifying a different device and a second access network of the different access networks; sending two authentication requests to authenticate the electronic transaction, a first authentication request of the two authentication requests sent to the device via the first access network of the different access networks, and a second authentication request of the two authentication requests sent to the different device via the second access network of the different access networks; determining validations of the two authentication procedures via the different access networks; and authenticating the electronic transaction in response to the validations of the two authentication procedures via the different access networks. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A memory device storing instructions that when executed cause a hardware processor to perform operations, the operations comprising:
-
processing an electronic transaction associated with a network address and with a device; querying a database for the network address to identify two authentication procedures specifying different access networks, the database electronically associating authentication procedures and network addresses including the network address specified by the electronic transaction, a first authentication procedure of the two authentication procedures specifying the device and a first access network of the different access networks, and a second authentication procedure of the two authentication procedures specifying a different device and a second access network of the different access networks; sending a first authentication request via the first access network to the device to authenticate the electronic transaction; receiving a first authentication information sent via the first access network from the device; sending a second authentication request via the second access network to the different device to authenticate the electronic transaction; receiving a second authentication information sent via the second access network from the different device; determining validations of the two authentication procedures via the different access networks; and authenticating the electronic transaction in response to the validations of the two authentication procedures via the different access networks. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification