Systems and methods for authentication, verification, and payments
First Claim
1. A method of authenticating a user seeking to conduct at least one interaction with a secured capability provided by a computer system, the method comprising:
- using the computer system to provide a first identifier to at least one verification server, the first identifier corresponding to the secured capability;
using the computer system to provide, to an electronic device being used by the user, a user-selectable application-specific resource identifier with a second identifier corresponding to the secured capability, the user-selectable application-specific resource identifier configured to, upon being selected by the user, initiate an app to run on the electronic device, the app configured to access the second identifier, to access user verification information, and to transmit a third identifier and the user verification information to the at least one verification server, the third identifier corresponding to the secured capability;
using the computer system to receive authorization information from at least one of the electronic device and the at least one verification server, the authorization information indicative of the user being authorized to conduct the at least one interaction with the secured capability; and
using a processor of the computer system to provide the user with access to conduct the at least one interaction with the secured capability in response at least to the authorization information.
1 Assignment
0 Petitions
Accused Products
Abstract
Computer systems and methods are provided for authenticating a user seeking to conduct at least one interaction with a secured capability provided by a computer. The method includes providing a first identifier to at least one verification server and providing a second identifier to an electronic device being used by the user. The first identifier and the second identifier each corresponds to the secured capability. The method further includes providing the electronic device with a user-selectable link configured to, upon being selected by the user, initiate a program to run on the electronic device. The program is configured to transmit a third identifier to the at least one verification server. The third identifier corresponds to the secured capability. The method further includes receiving authorization information from at least one of the electronic device and the at least one verification server. The method further includes using a processor (e.g., a processor of the computer) to provide the user with access to conduct the at least one interaction with the secured capability in response at least to the authorization information.
68 Citations
26 Claims
-
1. A method of authenticating a user seeking to conduct at least one interaction with a secured capability provided by a computer system, the method comprising:
-
using the computer system to provide a first identifier to at least one verification server, the first identifier corresponding to the secured capability; using the computer system to provide, to an electronic device being used by the user, a user-selectable application-specific resource identifier with a second identifier corresponding to the secured capability, the user-selectable application-specific resource identifier configured to, upon being selected by the user, initiate an app to run on the electronic device, the app configured to access the second identifier, to access user verification information, and to transmit a third identifier and the user verification information to the at least one verification server, the third identifier corresponding to the secured capability; using the computer system to receive authorization information from at least one of the electronic device and the at least one verification server, the authorization information indicative of the user being authorized to conduct the at least one interaction with the secured capability; and using a processor of the computer system to provide the user with access to conduct the at least one interaction with the secured capability in response at least to the authorization information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer storage having stored thereon a computer program that instructs a computer system to authenticate a user seeking to conduct at least one interaction with a secured capability provided by the computer system by at least:
-
using the computer system to provide a first identifier to at least one verification server, the first identifier corresponding to the secured capability; using the computer system to provide, to an electronic device being used by the user, a user-selectable application-specific resource identifier with a second identifier corresponding to the secured capability, the user-selectable application-specific resource identifier configured to, upon being selected by the user, initiate an app to run on the electronic device, the app configured to access the second identifier, to access user verification information, and to transmit a third identifier and the user verification information to the at least one verification server, the third identifier corresponding to the secured capability; using the computer system to receive authorization information from at least one of the electronic device and the at least one verification server, the authorization information indicative of the user being authorized to conduct the at least one interaction with the secured capability; and using a processor of the computer system to provide the user with access to conduct the at least one interaction with the secured capability in response at least to the authorization information. - View Dependent Claims (17, 18, 19)
-
-
20. A computer system hosting a secured capability with which a user is seeking to conduct at least one interaction, the computer system comprising:
-
a memory; and a processor configured to; provide a first identifier to at least one verification server, the first identifier corresponding to the secured capability; provide, to an electronic device being used by the user, a user-selectable application-specific resource identifier with a second identifier corresponding to the secured capability, the user-selectable application-specific resource identifier configured to, upon being selected by the user, initiate an app to run on the electronic device, the app configured to access the second identifier, to access user verification information, and to transmit a third identifier and the user verification information to the at least one verification server, the third identifier corresponding to the secured capability; receive authorization information from at least one of the electronic device and the at least one verification server, the authorization information indicative of the user being authorized to conduct the at least one interaction with the secured capability; and provide the user with access to conduct the at least one interaction with the secured capability in response at least to the authorization information. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
Specification