MULTICHANNEL DEVICE UTILIZING A CENTRALIZED OUT-OF-BAND AUTHENTICATION SYSTEM (COBAS)
4 Assignments
0 Petitions
Accused Products
Abstract
A multichannel security system is disclosed, which system is for granting and denying access to a host computer in response to a demand from an access-seeking individual and computer. The access-seeker has a peripheral device operative within an authentication channel to communicate with the security system. The access-seeker initially presents identification and password data over an access channel which is intercepted and transmitted to the security computer. The security computer then communicates with the access-seeker. A biometric analyzer—a voice or fingerprint recognition device—operates upon instructions from the authentication program to analyze the monitored parameter of the individual. In the security computer, a comparator matches the biometric sample with stored data, and, upon obtaining a match, provides authentication. The security computer instructs the host computer to grant access and communicates the same to the access-seeker, whereupon access is initiated over the access channel.
29 Citations
75 Claims
-
1-20. -20. (canceled)
-
21. A software method for employing a multichannel security system to control access to a computer, comprising the steps of:
-
receiving at an interception device in a first channel a login identification demand to access a host computer also in the first channel; verifying the login identification; receiving at a security computer in a second channel the demand for access and the login identification; outputting from the security computer a prompt requesting transmission of data; receiving the transmitted data at the security computer; comparing the transmitted data to predetermined data; and depending on the comparison of the transmitted and the predetermined data, outputting an instruction from the security computer to the host computer to grant access to the host computer or deny access thereto. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A software method for controlling access to a host computer, comprising the steps of:
-
receiving a request from a client computer for access to the host computer; outputting an instruction to present a login screen at the client computer; receiving an identification and first password from the client computer; retrieving a predetermined password from a subscriber database associated with the identification; verifying the first password matches the predetermined password; outputting a call-back request to a peripheral device comprising initiating a communication to the peripheral device and receiving a signal indicating a connection with the peripheral device; outputting an instruction to retrieve a predetermined second password; outputting to the peripheral device a prompt to enter a user-entered password; receiving from the peripheral device the user-entered password; verifying the received user-entered password; outputting to the peripheral device a second prompt to speak a password; receiving from the peripheral device the spoken password; verifying the received spoken password; and outputting an announcement that access to the host computer is granted. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 57, 58, 59)
-
-
56. (canceled)
-
60. A multichannel security system for granting and denying access to a host computer in a network environment comprising:
-
a security computer for communicating data via an authentication channel and an access channel; a line module program for intercepting a login identification accompanying a demand from an accessor in the access channel to access the host computer also in the access channel, verifying the login identification, and transmitting the login identification to an authentication channel; an authentication program in the authentication channel for authenticating the login identification received from the line module program; a prompt module program for selecting an announcement, outputting to a peripheral device or computer the announcement, verifying a speech or dual tone multi frequency (DTMF) password received, and optionally converting the speech to text; and a granting module program for granting and denying access to the host computer based on the received speech or password. - View Dependent Claims (61, 62, 63, 64, 65, 66)
-
-
67. A software method for employing a multichannel security system to control access to a computer, comprising the steps of:
-
receiving at a security computer predetermined data sent via an authentication channel from a peripheral device; identifying the peripheral device from a subscriber database and verifying the predetermined data by comparing it to stored data associated with the peripheral device; receiving a demand to access a host computer via an access channel comprising a login identification of an accessor; receiving the login identification at an interception device and routing the login identification to the security computer; and at the security computer, verifying that the login identification matches the predetermined data, and if it does, outputting an instruction to either grant or deny access to the access channel. - View Dependent Claims (68)
-
-
69. A software method for employing a multichannel security system to control access to a host computer in an access channel using a mobile device in an authentication channel, comprising the steps of:
-
providing a first software module on an Internet-connected web server in an access channel, the server being associated with a commercial institution, wherein the first software module receives a user ID associated with a subscriber account, and outputs information about the user ID; and providing a second software module on a security computer different than the web server, wherein the security computer is in an authentication channel, and wherein the second software module receives the user ID from the access channel, retrieves predetermined data from a subscriber database associated with the user ID, including at least a telephone number or IP address of a mobile device, and outputs in the authentication channel an instruction to the mobile device, wherein when a subscriber attempts to logon to a host computer in the access channel at the commercial institution, the second software module compares an input from the mobile device to the predetermined data and outputs an instruction to the first software module to grant access to the host computer or deny access thereto. - View Dependent Claims (70, 71, 72, 73)
-
-
74. A software method for employing a multichannel security system to control access to a computer, comprising the steps of:
-
receiving in a first channel a login identification demand to access a host computer also in the first channel; verifying the login identification; receiving at a security computer in a second channel the demand for access and the login identification; outputting from the security computer a prompt requesting a transmission of data; receiving the transmitted data at the security computer; comparing the transmitted data to predetermined data; and depending on the comparison of the transmitted and the predetermined data, outputting an instruction from the security computer to the host computer to grant access to the host computer or deny access thereto.
-
-
75. Apparatus for implementing a multichannel security system to control access to a computer, comprising:
-
a device for receiving a login identification and demand to access a host computer, wherein the device and the host computer are in a first channel; and a security computer in a second channel for receiving the login identification and the access demand and outputting a prompt requesting a transmission of data once said login identification is verified by said security computer, wherein said security computer comprises a component for receiving the transmitted data and comparing said transmitted data to predetermined data, such that, depending on the comparison of the transmitted and the predetermined data, said security computer outputs an instruction to the host computer to grant access to the host computer or deny access thereto.
-
Specification