METHODS AND SYSTEMS FOR PROVIDING BIDIRECTIONAL AUTHENTICATION
First Claim
1. A method of providing access to a secure computing device, the method comprising:
- receiving, by a security device, a request to generate data for a secure access;
generating, by the security device, a one-time password and a sequence of symbologies;
transmitting, by the security device, the one-time password, the sequence of symbologies and location information to a secure computing device, wherein the location information corresponds to a location of the security device; and
displaying, by the security device, the one-time password and the sequence of symbologies to the user.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for providing access to a secure computing device are disclosed. A security device is used to generate a one-time password, a sequence of symbologies, and location information. The security device transmits the password, sequence and location information to the secure computing device for storage and displays the password and sequence to a user. A user device provides a password to the secure computing device in order to obtain access. The secure computing device compares the password with the stored one-time password to verify the user of the user device and sends the sequence to the user device in response. The user or user device verifies the sequence of symbologies to confirm the secure access. The location information may be used to detect fraudulent accesses to the user account.
-
Citations
16 Claims
-
1. A method of providing access to a secure computing device, the method comprising:
-
receiving, by a security device, a request to generate data for a secure access; generating, by the security device, a one-time password and a sequence of symbologies; transmitting, by the security device, the one-time password, the sequence of symbologies and location information to a secure computing device, wherein the location information corresponds to a location of the security device; and displaying, by the security device, the one-time password and the sequence of symbologies to the user. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of accessing a secure computing device, the method comprising:
-
receiving a one-time password and a first sequence of symbologies from a security device; accessing, by a user device, a secure computing device by providing the one-time password to the secure computing device; receiving, by the user device, a second sequence of symbologies from the secure computing device; and verifying that the first sequence of symbologies matches the second sequence of symbologies. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A system for providing access to a secure computing device, the system comprising:
-
a processing device; and a processor-readable storage medium in operable communication with the processing device, wherein the processor-readable storage medium contains one or more programming instructions that, when executed, cause the processing device to; receive a request to generate data for a secure access, generate a one-time password and a sequence of symbologies, transmit the one-time password, the sequence of symbologies and location information to a secure computing device, and display the one-time password and the sequence of symbologies to the user. - View Dependent Claims (13, 14, 15, 16)
-
Specification