Authentication services using mobile device
First Claim
Patent Images
1. A method, comprising:
- authenticating a mobile device communicably connectable to a wireless network by an authentication parameter from a secure transaction server (STS), as a mobile device authenticator;
providing an STS correlation between a personal identification entry (PIE) and the mobile device authenticator; and
providing an authentication function upon a user attempting an access to a provider as an action with the provider, the provider including a physical environment, a computer system, or any combinations thereof, according to one or more authentication services including an authentication service of;
receiving by the STS, a provider authentication request, in response to the user attempted access to the provider computer system,transmitting by the STS a transaction token to the provider computer system, in response to the received provider authentication request,inputting, by a user, the PIE and the transaction token, to the mobile device authenticator to transmit a transformed secure user authenticable authorization request to the STS over the wireless network as a user authorization of the action with the provider, based upon the PIE, the transaction token and the authentication parameter,verifying, by the STS, the provider authentication request and the user authorization to access the provider,transmitting, by the STS, a user authentication result to the provider computer system, according to the verifying, andauthorizing the user access to the provider computer system, according to the user authentication result transmitted from the STS.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, and an apparatus performing the method, is provided by authenticating a mobile device communicably connectable to a wireless network by an authentication parameter from a secure transaction server (STS), as a mobile device authenticator; providing an STS correlation between a personal identification entry (PIE) and the mobile device authenticator; and inputting, by a user, the PIE and a provider action, to the mobile device authenticator to transmit a transformed secure user authenticable authorization request to the STS over the wireless network to authorize an action with a provider.
710 Citations
20 Claims
-
1. A method, comprising:
-
authenticating a mobile device communicably connectable to a wireless network by an authentication parameter from a secure transaction server (STS), as a mobile device authenticator; providing an STS correlation between a personal identification entry (PIE) and the mobile device authenticator; and providing an authentication function upon a user attempting an access to a provider as an action with the provider, the provider including a physical environment, a computer system, or any combinations thereof, according to one or more authentication services including an authentication service of; receiving by the STS, a provider authentication request, in response to the user attempted access to the provider computer system, transmitting by the STS a transaction token to the provider computer system, in response to the received provider authentication request, inputting, by a user, the PIE and the transaction token, to the mobile device authenticator to transmit a transformed secure user authenticable authorization request to the STS over the wireless network as a user authorization of the action with the provider, based upon the PIE, the transaction token and the authentication parameter, verifying, by the STS, the provider authentication request and the user authorization to access the provider, transmitting, by the STS, a user authentication result to the provider computer system, according to the verifying, and authorizing the user access to the provider computer system, according to the user authentication result transmitted from the STS. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer system, comprising:
-
a secure transaction server (STS) authenticating a mobile device communicably connectable to a wireless network by an authentication parameter as a mobile device authenticator, and providing a correlation between a personal identification entry (PIE) and the mobile device authenticator; and a provider computer system providing an authentication function upon a user attempting an access to the provider as an action with the provider, the provider including a physical environment, a computer system, or any combinations thereof, according to one or more authentication services including an authentication service of; providing to the STS a provider authentication request, in response to the user attempted access to the provider computer system, receiving from the STS a transaction token, in response to the received provider authentication request, requesting a user to input the PIE and the transaction token, to the mobile device authenticator to transmit a transformed secure user authenticable authorization request to the STS over the wireless network as a user authorization of the action with the provider, based upon the PIE, the transaction token and the authentication parameter, receiving from the STS a user authentication result, based upon verifying, by the STS, the provider authentication request and the user authorization to access the provider, and authorizing the user access to the provider computer system, according to the user authentication result received from the STS. - View Dependent Claims (17, 18, 19, 20)
-
Specification