User authentication based on fob/indicia scan
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-021/31
G06F-021/62
H04L-029/06
출원번호
US-0175615
(2014-02-07)
등록번호
US-9317674
(2016-04-19)
발명자
/ 주소
Grigg, David M.
Burrell, Charles Jason
Bertanzetti, Peter John
출원인 / 주소
Bank of America Corporation
대리인 / 주소
Springs, Michael A.
인용정보
피인용 횟수 :
10인용 특허 :
47
초록▼
Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one function associated with a first application; determining that access to at least one function requires user authentication; initiating sensing o
Embodiments of the invention are directed to systems, methods and computer program products for receiving a request from a user for access to at least one function associated with a first application; determining that access to at least one function requires user authentication; initiating sensing of an authentication validating carrier comprising a first credential; determining the first credential based at least in part on the sensed authentication validating carrier; validating the first credential, thereby resulting in a first successful user authentication; and granting access to at least one function associated with the first application based on the validation of the first successful user authentication.
대표청구항▼
1. An apparatus for authenticating a user, the apparatus comprising: a memory;a processor;at least one sensor for continuously sensing an authentication validating carrier and communicating carrier information based on the authentication validating carrier to the processor, wherein the carrier infor
1. An apparatus for authenticating a user, the apparatus comprising: a memory;a processor;at least one sensor for continuously sensing an authentication validating carrier and communicating carrier information based on the authentication validating carrier to the processor, wherein the carrier information comprises a continuous stream of data; anda module stored in the memory, executable by the processor, and configured to cause the processor to: receive a first request from a user to access at least one first function associated with a first application;determine that access to the at least one first function requires user authentication;initiate sensing of the authentication validating carrier comprising a first credential, wherein initiating sensing of the authentication validating carrier comprises a continuous process;determine the first credential based at least in part on the sensed authentication validating carrier, wherein determining the first credential is based at least in part on the carrier information, wherein determining the first credential comprises continuously analyzing the stream of data thereby resulting in the first credential;validate the first credential, thereby resulting in a first successful user authentication; andgrant access to the at least one first function associated with the first application based at least in part on the first successful user authentication. 2. The apparatus of claim 1, wherein the at least one sensor comprises a camera; wherein the carrier information comprises an image of indicia;wherein the sensor is for sensing and communicating the image of indicia to the processor; andwherein determining the first credential comprises decoding the image of indicia, thereby resulting in the first credential. 3. The apparatus of claim 1, wherein the at least one sensor comprises a microphone; wherein the carrier information comprises an encoded audio message;wherein the sensor is for sensing and communicating the encoded audio message to the processor; andwherein determining the first credential comprises decoding the encoded audio message, thereby resulting in the first credential. 4. The apparatus of claim 1, wherein the at least one sensor is a near field communications (NFC) reader; wherein the carrier information comprises a signal comprised of an encoded message emitted from a fob;wherein the at least one sensor is for sensing and communicating the signal from the fob to the processor; andwherein determining the first credential comprises decoding the encoded message, thereby resulting in the first credential. 5. The apparatus of claim 1, wherein the at least one sensor comprises a short range data transceiver; wherein the carrier information comprises a signal comprised of an encoded message emitted from a short range data emitter;wherein the at least one sensor is for sensing and communicating the signal from the short range data emitter to the processor; andwherein determining the first credential comprises decoding the encoded message, thereby resulting in the first credential. 6. The apparatus of claim 1, wherein the at least one sensor comprises an accelerometer; wherein the carrier information comprises movement from the apparatus;wherein the at least one sensor is for sensing and communicating the movement from the apparatus to the processor; andwherein determining the first credential comprises analyzing the movement from the apparatus thereby resulting in the first credential. 7. The apparatus of claim 1, wherein the at least one sensor comprises a light sensor; wherein the carrier information comprises a pulsed light signal;wherein the at least one sensor is for sensing and communicating the pulsed light signal to the processor;wherein determining the first credential comprises analyzing the pulsed light signal thereby resulting in the first credential. 8. The apparatus of claim 1, wherein the first application comprises more than one function; wherein the apparatus comprises more than one sensor and is configured to sense more than one authentication validating carrier;wherein the functions associated with the first application comprise different levels of sensitivity;wherein, the apparatus is configured to obtain and authenticate a specific authentication validating carrier depending on the first request. 9. The apparatus of claim 1, wherein the module is further configured to cause the processor to: receive a second credential from the user;validate the second credential, thereby resulting in a second successful user authentication; andwherein granting access to the at least one first function associated with the first application is further based at least in part on the second successful user authentication. 10. The apparatus of claim 1, wherein the module is further configured to cause the processor to: receive a second request from the user for access to at least one second function associated with a second application;determine that access to at least one second function associated with the second application requires user authentication;receive a second credential from the user;validate the second credential, thereby resulting in a second successful user authentication; andgrant access to the at least one second function associated with the second application based on the second successful user authentication. 11. The apparatus of claim 10, wherein the access to at least one first function associated with the first application expires after an occurrence of an expiration event; and wherein the expiration event is at least one of a lapse of a period of time, an event associated with a third party application, an event associated with an operating system, and a user-initiated event. 12. The apparatus of claim 11, wherein the expiration of the at least one first function associated with the first application is extended based at least in part on successfully validating the second credential. 13. The apparatus of claim 12, wherein the number of times the expiration may be extended is limited as set by at least one of the user, the first application, the second application, a third party application, and an operating system. 14. The apparatus of claim 11, wherein the apparatus is further configured to deny access to the at least one first function associated with the first application if the second credential cannot be verified. 15. The apparatus as of claim 10, wherein the at least one first function associated with the first application is a subset of functions of the at least one second function associated with the second application. 16. The apparatus of claim 1, wherein validating the first credential comprises: receiving an encrypted key from a remote server;decrypting the encrypted key from the remote server using a common key;encrypting the first credential using the decrypted key;sending the encrypted first credential to the remote server using a network connection; andreceiving a message from the remote server indicating whether the first credential was effectively validated. 17. A method for authenticating a user, the method comprising: receiving, by a computer processor, a request from a user to access at least one first function associated with a first application;determining, by a computer processor, that access to the at least one first function requires user authentication;initiating sensing, by a computer processor using a sensor, of an authentication validating carrier comprising a firsts credential, the sensor being configured to continuously sense the authentication validating carrier and communicate carrier information based on the authentication validating carrier to the processor, wherein the carrier information comprises a continuous stream of data, wherein initiating sensing of the authentication validating carrier comprises a continuous process;determining, by a computer processor, the first credential based at least in part on the sensed authentication validating carrier, wherein determining the first credential is based at least in part on the carrier information, wherein determining the first credential comprises continuously analyzing the stream of data thereby resulting in the first credential;validating, by a computer processor, the first credential, thereby resulting in a first successful user authentication; andgranting access, by a computer processor, to the at least one first function associated with the first application based at least in part on the first successful user authentication. 18. A computer program product for authenticating a user, the computer program product comprising: a non-transitory computer-readable medium comprising:a first set of codes for receiving a request from a user for access to at least one first function associated with a first application;a second set of codes for determining that access to the at least one first function requires user authentication;a third set of codes for initiating sensing, using a sensor, of an authentication validating carrier comprising a first credential, the sensor being configured to continuously sense the authentication validating carrier and communicate carrier information based on the authentication validating carrier to the processor, wherein the carrier information comprises a continuous stream of data, wherein initiating sensing of the authentication validating carrier comprises a continuous process;a fourth set of codes for determining the first credential based at least in part on the sensed authentication validating carrier, wherein determining the first credential is based at least in part on the carrier information, wherein determining the first credential comprises continuously analyzing the stream of data thereby resulting in the first credential;a fifth set of codes for validating the first credential, thereby resulting in a first successful user authentication; anda sixth set of codes for granting access to the at least one first function associated with the first application based at least in part on the successful user authentication.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (47)
Davies Stephen W., Alarm server systems, apparatus, and processes.
Ayanamcottil, Antony Aloysius; Chandrappa, Varun Yarehalli; Revankar, Natesh Shridhar; Verma, Priya; Alam, Mohammad Dilshad; Sharma, Nitin Prakash; Pullaikudi, Praveen Prakash Thazhalhu, Method for destructive readout of data in case of mobile theft.
Natsuno,Takeshi, Method for inhibiting use of mobile communication terminal having memory where card information is stored, mobile communication network, and mobile communication terminal.
Aravamudan, Murali; Rajasekharan, Ajit; Ramakrishnan, Kajamalai G.; Gupta, Mayank, Methods and systems for segmenting relative user preferences into fine-grain and coarse-grain collections.
Grigg, David M.; Thomas, Susan Smith; Harkey, Scott Lee; Bondesen, Laura; Calman, Matthew A., Providing automated initial and final payment for an activity based on determining the location of an activity participant's mobile communication device.
Ellis, Stephen M.; Kennedy, Michael J.; Kurani, Ashish Bhoopen; Lowry, Melissa; Meyyappan, Uma; Sahni, Bipin; Stroke, Nikolai, System and method for a mobile wallet.
Berardi,Michael J.; Bliman,Michal; Bonalle,David S.; Elwood,Jennifer Anne; Hood,Matthew C.; Isenberg,Susan E.; Mayers,Alexandra; Saunders,Peter D.; Scheding,Kathryn D.; Shah,Sejal Ajit; Williamson,Jo, System and method for payment using radio frequency identification in contact and contactless transactions.
Dhesi, Rajkaran Singh; Hunt, Simon; Parke, Paul Martin, System, method, and computer program product for disabling a communication channel during authentication.
Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Authentication level of function bucket based on circumstances.
Votaw, Elizabeth S.; Jones-McFadden, Alicia C.; Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne, Determining user authentication based on user/device interaction.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements along a continuum based on a current state of the user and/or the attributes related to the function requiring authentication.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location.
Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., Self-selected user access based on specific authentication types.
Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E.; Votaw, Elizabeth S., User authentication based on other applications.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.