Patent Issued for Quick-logon for computing device (USPTO 11210382): United Services Automobile Association - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
January 14, 2022 Newswires
Share
Share
Post
Email

Patent Issued for Quick-logon for computing device (USPTO 11210382): United Services Automobile Association

Insurance Daily News

2022 JAN 14 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- A patent by the inventors Bennett, Jr., Wilbert (San Antonio, TX, US), Davey, Richard A. (San Antonio, TX, US), filed on May 29, 2020, was published online on December 28, 2021, according to news reporting originating from Alexandria, Virginia, by NewsRx correspondents.

Patent number 11210382 is assigned to United Services Automobile Association (San Antonio, Texas, United States).

The following quote was obtained by the news editors from the background information supplied by the inventors: “The protection and security of customer information is vital from an organization’s perspective, not only to comply with applicable laws, but to earn and maintain customer trust. Enhanced security often comes at the cost of convenience for the user, such as by requiring the user to answer additional security questions. Various methods are used in authenticating a user attempting to access an account. Security analysts have identified three authentication factors that can be used in making a positive identification: ownership, knowledge, and inherence. Elements used to verify the first factor, ownership, may include a phone, a security token, or a software token. Elements used to verify the knowledge factor may include a password, username, personal identification number (PIN), or answers to security questions. Elements used to verify the inherence factor may include biometric data.

“Verifying two of the factors, “two-factor authentication”, is commonly used to authenticate a user. For example, many applications on mobile devices require the user to enter a PIN, satisfying the knowledge factor, on a particular mobile device, satisfying the ownership factor. In some mobile devices, the ownership factor is generally assumed to be satisfied because many mobile devices, such as smartphones, are particular to one person. Thus, an impersonator would be required not only to have the mobile device, but also to know the PIN in order to access the application. This enables users to simply input a PIN into an application on a mobile device to be authenticated.

“Personal computers (computing devices) pose additional complexities in authenticating users. Computing devices are commonly used by more than one person. Thus, it is not safe to assume that the identity of the computing device satisfies the ownership factor. Additionally, computing devices in general have been more easily compromised than other devices. Current solutions increase security, but are often inconvenient for users. For example, one solution includes providing users with some type of token, requiring the user to prove that the user has the token, such as by typing in a one-time code generated by the token in combination with a username/password/PIN. Other solutions focus on the knowledge factor such as by requiring the user to answer additional security questions.”

In addition to the background information obtained for this patent, NewsRx journalists also obtained the inventors’ summary information for this patent: “Disclosed herein are methods and systems for verifying a user’s identity on a computing device using two-factor authentication. More particularly, the system can use a personal identification number input by a user, together with one or more of a secure browsing feature, a device fingerprint, and a token generator to authenticate the user on the computer.

“When multiple embodiments are disclosed, still other embodiments of the present disclosure will become apparent to those skilled in the art from the following detailed description, which shows and describes illustrative embodiments of the disclosure. As will be realized, the disclosure is capable of modifications in various aspects, all without departing from the scope of the present disclosure. Accordingly, the drawings and detailed description are to be regarded as illustrative in nature and not restrictive.

“The drawings have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be expanded or reduced to help improve the understanding of the embodiments of the present disclosure. Similarly, some components and/or operations may be separated into different blocks or combined into a single block for the purposes of discussion of some of the embodiments of the present disclosure. Moreover, while the disclosure is amenable to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and are described in detail below. The intention, however, is not to limit the disclosure to the particular embodiments described. On the contrary, the disclosure is intended to cover all modifications, equivalents, and alternatives falling within the scope of the disclosure as defined by the appended claims.”

The claims supplied by the inventors are:

“1. A computer-implemented method comprising: sending, from a computing device associated with a user to a server, a secure token to fulfill a first authentication request, wherein the secure token is generated by a token generator associated with the computing device, wherein the user is permitted to engage in a first activity after authentication, wherein authentication includes at least verification that the secure token matches a secure token generated by the token generator associated with the computing device; receiving, from the server, access to the secure token in a human-readable format to fulfill a second authentication request associated with a second activity having a different level of authentication than the first activity; requesting engagement in the second activity; and sending, to the server, the secure token, wherein the secure token is the same secure token that was used to fulfill the first authentication request, wherein the user is permitted to engage in the second activity upon verification that the secure token matches the secure token generated by the token generator associated with the computing device.

“2. The method of claim 1, wherein receiving, from the server, access to the secure token comprises at least one of: displaying the secure token on a lock screen of the computing device or storing the secure token in an application installed on the computing device.

“3. The method of claim 1, wherein the second activity requires a higher level of authentication than the first activity.

“4. The method of claim 1, wherein the secure token is dynamic, wherein the first activity takes place via a first channel, wherein the first channel is one of: a mobile application, a web portal, a chat room, a voice and data call, or a voice call.

“5. The method of claim 4, wherein the second activity takes place via a second channel, wherein the second channel is different than the first channel.

“6. The method of claim 1, wherein the secure token is a quick response code, wherein the quick response code is physically presented to a second device.

“7. The method of claim 1, wherein authenticating the user comprises verifying an identity of the user, wherein verifying the identity of the user further includes: monitoring interactions of the user including browsing behavior with the computing device; determining whether the interactions of the user with the computing device matches, within a predetermined degree of tolerance, expected behavior within a user profile of the user; and in response to the interactions of the user matching the expected behavior within the user profile, verifying the identity of the user.

“8. A non-transitory computer-readable medium comprising instructions stored thereon, that when executed on a processor, perform operations comprising: sending, from a computing device associated with a user to a server, a secure token to fulfill a first authentication request, wherein the secure token is generated by a token generator associated with the computing device, wherein the user is permitted to engage in a first activity after authentication, wherein authentication includes at least verification that the secure token matches a secure token generated by the token generator associated with the computing device; receiving, from the server, access to the secure token in a human-readable format to fulfill a second authentication request associated with a second activity having a different level of authentication than the first activity; requesting engagement in the second activity; and sending, to the server, the secure token, wherein the secure token is the same secure token that was used to fulfill the first authentication request, wherein the user is permitted to engage in the second activity upon verification that the secure token matches the secure token generated by the token generator associated with the computing device.

“9. The non-transitory computer-readable medium of claim 8, wherein receiving, from the server, access to the secure token comprises at least one of: displaying the secure token on a lock screen of the computing device or storing the secure token in an application installed on the computing device.

“10. The non-transitory computer-readable medium of claim 8, wherein the second activity requires a higher level of authentication than the first activity.

“11. The non-transitory computer-readable medium of claim 8, wherein the secure token is dynamic, wherein the first activity takes place via a first channel, wherein the first channel is one of: a mobile application, a web portal, a chat room, a voice and data call, or a voice call.

“12. The non-transitory computer-readable medium of claim 11, wherein the second activity takes place via a second channel, wherein the second channel is different than the first channel.

“13. The non-transitory computer-readable medium of claim 8, wherein the secure token is a quick response code, wherein the quick response code is physically presented to a second device.

“14. The non-transitory computer-readable medium of claim 8, wherein authenticating the user comprises verifying an identity of the user, wherein verifying the identity of the user further includes: monitoring interactions of the user including browsing behavior with the computing device; determining whether the interactions of the user with the computing device matches, within a predetermined degree of tolerance, expected behavior within a user profile of the user; and in response to the interactions of the user matching the expected behavior within the user profile, verifying the identity of the user.

“15. A call routing system comprising: one or more processors; and a computer readable storage medium having instructions stored thereon, which when executed by the one or more processors, cause the call routing system to: send, from a computing device associated with a user to a server, a secure token to fulfill a first authentication request, wherein the secure token is generated by a token generator associated with the computing device, wherein the user is permitted to engage in a first activity after authentication, wherein authentication includes at least verification that the secure token matches a secure token generated by the token generator associated with the computing device; receive, from the server, access to the secure token in a human-readable format to fulfill a second authentication request associated with a second activity having a different level of authentication than the first activity; request engagement in the second activity; and send, to the server, the secure token, wherein the secure token is the same secure token that was used to fulfill the first authentication request, wherein the user is permitted to engage in the second activity upon verification that the secure token matches the secure token generated by the token generator associated with the computing device.

“16. The call routing system of claim 15, wherein receiving, from the server, access to the secure token comprises at least one of: displaying the secure token on a lock screen of the computing device or storing the secure token in an application installed on the computing device.

“17. The call routing system of claim 15, wherein the second activity requires a higher level of authentication than the first activity.

“18. The call routing system of claim 15, wherein the secure token is dynamic, wherein the first activity takes place via a first channel, wherein the first channel is one of: a mobile application, a web portal, a chat room, a voice and data call, or a voice call, wherein the second activity takes place via a second channel, wherein the second channel is different than the first channel.

“19. The call routing system of claim 15, wherein the secure token is a quick response code, wherein the quick response code is physically presented to a second device.

“20. The call routing system of claim 15, wherein authenticating the user comprises verifying an identity of the user, wherein verifying the identity of the user further includes: monitoring interactions of the user including browsing behavior with the computing device; determining whether the interactions of the user with the computing device matches, within a predetermined degree of tolerance, expected behavior within a user profile of the user; and in response to the interactions of the user matching the expected behavior within the user profile, verifying the identity of the user.”

URL and more information on this patent, see: Bennett, Jr., Wilbert. Quick-logon for computing device. U.S. Patent Number 11210382, filed May 29, 2020, and published online on December 28, 2021. Patent URL: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=11210382.PN.&OS=PN/11210382RS=PN/11210382

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

SAFOSO AG Reports Findings in African Swine Fever (Integrating digital and field surveillance as complementary efforts to manage epidemic diseases of livestock: African swine fever as a case study): Tick-Borne Diseases and Conditions – African Swine Fever

Newer

New Mathematics Study Findings Reported from School of Finance (Corporate Diversification, Ownership, and Solvency in China’s Property-Liability Insurance Companies): Mathematics

Advisor News

  • 6 in 10 Americans struggle with financial decisions
  • Trump bets his tax cuts will please Las Vegas voters on his swing West
  • Lifetime income is the missing link to global retirement security
  • Don’t let caregiving derail your clients’ retirement
  • The ‘magic number’ for retirement hits $1.45M
More Advisor News

Annuity News

  • Annuity industry grapples with consolidation, innovation and planning shifts
  • Human connection still key in the new annuity era
  • Lifetime income is the missing link to global retirement security
  • ‘All-weather’ annuity portfolios aim to sharply limit rainy days
  • Annuity income: The new 401(k) standard?
More Annuity News

Health/Employee Benefits News

  • Gyde Acquires Benavest to Expand AI-Powered Brokerage Platform and Accelerate Consumer Health Insurance Growth
  • Navigator cuts leave Americans with less help to find Obamacare plans
  • Health care deductibles could double, triple after School Board vote
  • Trump admin seeks health-care price transparency
  • OID approved in effort to make health coverage more affordable
More Health/Employee Benefits News

Life Insurance News

  • National Life Group Releases its 2025 Annual Report and Business Highlights
  • Is life insurance through an employer enough?
  • Best’s Market Segment Report: Australia’s Non-Life Insurance Segment Navigating Growth in a Volatile Landscape
  • AI and life insurance: Fast today, unpredictable tomorrow
  • Judge allows PHL policyholders to intervene, denies ‘premium holiday’
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Protectors Vegas Arrives Nov 9th - 11th
1,000+ attendees. 150+ speakers. Join the largest event in life & annuities this November.

A FIA Cap That Stays Locked
CapLock™ from Oceanview locks the cap at issue for 5 or 7 years. No resets. Just clarity.

Aim higher with Ascend annuities
Fixed, fixed-indexed, registered index-linked and advisory annuities to help you go above and beyond

Unlock the Future of Index-Linked Solutions
Join industry leaders shaping next-gen index strategies, distribution, and innovation.

Leveraging Underwriting Innovations
See how Pacific Life’s approach to life insurance underwriting can give you a competitive edge.

Bring a Real FIA Case. Leave Ready to Close.
A practical working session for agents who want a clearer, repeatable sales process.

Press Releases

  • RFP #T01325
  • RFP #T01325
  • RFP #T01825
  • RFP #T01825
  • RFP #T01525
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet