System and Method for Second Factor Authentication
First Claim
1. A method of communication, comprising:
- receiving a request for second factor authentication (SFA) that contains information regarding a user;
generating an SFA token based on the received request;
associating the SFA token with an identifier for the user in a repository; and
communicating with the user using the SFA token.
1 Assignment
0 Petitions
Accused Products
Abstract
As individuals increasingly engage in different types of transactions they face a growing threat from, possibly among other things, identity theft, financial fraud, information misuse, etc. and the serious consequences or repercussions of same. Leveraging the ubiquitous nature of wireless devices and the popularity of (Short Message Service, Multimedia Message Service, etc.) messaging, an infrastructure that enhances the security of the different types of transactions within which a wireless device user may participate through a Second Factor Authentication facility. The infrastructure may optionally leverage the capabilities of a centrally-located Messaging Inter-Carrier Vendor.
23 Citations
20 Claims
-
1. A method of communication, comprising:
-
receiving a request for second factor authentication (SFA) that contains information regarding a user; generating an SFA token based on the received request; associating the SFA token with an identifier for the user in a repository; and communicating with the user using the SFA token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
one or more gateways configured to receive a request for second factor authentication (SFA) that contains information regarding a user; a workflow component configured to generate an SFA token based on the received request; a repository configured to associate the SFA token with an identifier for the user; and wherein at least one of the one or more gateways is configured to communicate with the user using the SFA token. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer readable medium containing computer instructions that, when executed by one or more processors, cause the one or more processors to take actions, comprising:
-
receiving a request for second factor authentication (SFA) that contains information regarding a user; generating an SFA token based on the received request; associating the SFA token with an identifier for the user in a repository; and communicating with the user using the SFA token.
-
Specification