System and method for second factor authentication
First Claim
Patent Images
1. A method of communication, comprising:
- receiving a request for second factor authentication (SFA) from a third party wherein the request for SFA contains information regarding a user and a desired characteristic of the SFA;
generating an SFA token based on the received information regarding the user and the desired characteristic of the SFA;
associating the SFA token with an identifier for the user in a repository;
sending the generated SFA token to a device associated with the user and to the third party, wherein the third party preserves the SFA token within its environment; and
communicating with the user using the SFA token,wherein at least one of the receiving, generating, associating, and communicating is performed using one or more computers.
1 Assignment
0 Petitions
Accused Products
Abstract
As individuals increasingly engage in different types of transactions they face a growing threat from, possibly among other things, identity theft, financial fraud, information misuse, etc. and the serious consequences or repercussions of same. Leveraging the ubiquitous nature of wireless devices and the popularity of (Short Message Service, Multimedia Message Service, etc.) messaging, an infrastructure that enhances the security of the different types of transactions within which a wireless device user may participate through a Second Factor Authentication facility. The infrastructure may optionally leverage the capabilities of a centrally-located Messaging Inter-Carrier Vendor.
84 Citations
21 Claims
-
1. A method of communication, comprising:
-
receiving a request for second factor authentication (SFA) from a third party wherein the request for SFA contains information regarding a user and a desired characteristic of the SFA; generating an SFA token based on the received information regarding the user and the desired characteristic of the SFA; associating the SFA token with an identifier for the user in a repository; sending the generated SFA token to a device associated with the user and to the third party, wherein the third party preserves the SFA token within its environment; and communicating with the user using the SFA token, wherein at least one of the receiving, generating, associating, and communicating is performed using one or more computers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system, comprising:
-
one or more gateways configured to receive a request for second factor authentication (SFA) from a third party, wherein the request for SFA contains information regarding a user and a desired characteristic of the SFA; a workflow component configured to generate an SFA token based on the information regarding the user and the desired characteristic of the SFA; a repository configured to associate the SFA token with an identifier for the user; and wherein at least one of the one or more gateways is configured to; send the SFA token to a device associated with the user and to the third party, wherein the SFA token is configured to be preserved by the third party within its environment, and communicate with the user using the SFA token. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer readable medium containing computer instructions that, when executed by one or more processors, cause the one or more processors to take actions, comprising:
-
receiving a request for second factor authentication (SFA) from a third party, wherein the request for SFA contains information regarding a user and a desired characteristic of the SFA; generating an SFA token based on the received information regarding the user and desired characteristic of the SFA; sending the generated SFA token to a device associated with the user and to the third party, wherein the third party preserves the SFA token within its environment; associating the SFA token with an identifier for the user in a repository; and communicating with the user using the SFA token.
-
Specification