Patent Issued for Systems and methods for communications channel authentication (USPTO 11750587): United Services Automobile Association
2023 SEP 26 (NewsRx) -- By a
The patent’s inventors are Voutour,
This patent was filed on
From the background information supplied by the inventors, news correspondents obtained the following quote: “A communications channel refers to the medium used to convey information from a sender to a receiver. Communications channels include voice and data channels. A receiver may have to authenticate to a sender to access the communications channel. An authentication procedure (e.g., involving a user name, password, a pass phrase, a personal identification number (PIN), etc.) may establish the identity of the receiver with some degree of confidence, and the sender may grant access privileges to that identity.
“If a receiver is authenticated to the sender by a first communications channel and would like to engage a second communications channel to access the sender the receiver has to separately authenticate to the sender via the second communications channel. This is burdensome and time-consuming to both the sender and the receiver.”
Supplementing the background information on this patent, NewsRx reporters also obtained the inventors’ summary information for this patent: “A user may access an instigation system via more than one communications channel, either by the same device (e.g., a mobile device accessing the institution system via a voice channel and a data channel) or by different devices (e.g., a personal computer (PC) via a web channel and a phone via a voice channel).
“In an implementation, if a user is not currently authenticated to a communications channel and attempts to access the institution system via a communications channel, the user may be authenticated using strong authentication. If the user is currently authenticated to the institution system via a communications channel and would like to engage a second communications channel to access the institution system, the user may authenticate to the second communications channel using both communications channels and weak authentication, such as single factor authentication or a challenge question.
“In an implementation, a challenge question may be presented to the user via one communications channel, and the user may provide the response via another communications channel. The user may have previously authenticated via one of the communications channels and that session may still be active.
“This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.”
The claims supplied by the inventors are:
“1. A communications channel authentication method, comprising: receiving a request from a first user device through a first communications channel to establish a session with a system for a user of the first user device; determining that a session established for the user between a second user device and the system through a second communications channel is active; in response to determining that the session with the system through the second communications channel is active, sending an authentication challenge to the second user device through the second communication channel, the authentication challenge comprising a first number of authentication factors; authenticating the first user device for access to the system through the first communications channel based on a response to the authentication challenge received through the first communication channel; and prior to receiving the request from the first user device, establishing the session between the second user device and the system through the second communication channel including by authenticating the second user device using a layered authentication process that comprise multiple authentication factors, at least one of the multiple authentication factors being a username and password combination, wherein the first communications channel is one of a voice channel or a data channel and the second communications channel is the other of the voice channel or the data channel.
“2. The method of claim 1, further comprising authenticating, prior to determining that the session established between the second user device and the system through the first communications channel is active, the second user device using the second communications channel.
“3. The method of claim 2, further comprising, establishing, in response to authenticating the second user device using the second communications channel, the session between the second user device and the system through the second communications channel.
“4. The method of claim 1, wherein the first number of authentication factors is two or more.
“5. The method of claim 1, wherein authenticating the first user device for access to the system through the first communications channel is performed using the second user device.
“6. The method of claim 1, wherein authenticating the first user device for access to the system through the first communications channel is performed using a third user device.
“7. The method of claim 1, wherein the authentication challenge is sent using the first communications channel.
“8. The method of claim 1, wherein the first communication channel is a voice channel and the second communication channel is a data channel.
“9. The method of claim 1, wherein the first communication channel is a data channel and the second communication channel is a voice channel.
“10. The method of claim 1, wherein the authentication challenge comprises fewer authentication factors than the layered authentication process used to authenticate the second user device.
“11. A communications channel authentication system, comprising: at least one computer; and a non-transitory computer-readable medium coupled to the at least one computer having instructions stored thereon which, when executed by the at least one computer, cause the at least one computer to perform operations comprising: receiving a request from a first user device through a first communications channel to establish a session with a system for a user of the first user device; determining that a session established for the user between a second user device and the system through a second communications channel is active; in response to determining that the session with the system through the second communications channel is active, sending an authentication challenge to the second user device through the second communication channel, the authentication challenge comprising a first number of authentication factors; authenticating the first user device for access to the system through the first communications channel based on a response to the authentication challenge received through the first communication channel; and prior to receiving the request from the first user device, establishing the session between the second user device and the system through the second communication channel including by authenticating the second user device using a layered authentication process that comprise multiple authentication factors, at least one of the multiple authentication factors being a username and password combination, wherein the first communications channel is one of a voice channel or a data channel and the second communications channel is the other of the voice channel or the data channel.
“12. The system of claim 11, the operations further comprising authenticating, prior to determining that the session established between the second user device and the system through the first communications channel is active, the second user device using the second communications channel.
“13. The system of claim 12, the operations further comprising, establishing, in response to authenticating the second user device using the second communications channel, the session between the second user device and the system through the second communications channel.
“14. The system of claim 11, wherein the first number of authentication factors is two or more.
“15. The system of claim 11, wherein authenticating the first user device for access to the system through the first communications channel is performed using the second user device.
“16. The system of claim 11, wherein authenticating the first user device for access to the system through the first communications channel is performed using a third user device.
“17. The system of claim 11, wherein the authentication challenge is sent using the first communications channel.
“18. A non-transitory computer-readable medium coupled to at least one computer having instructions stored thereon which, when executed by the at least one computer, cause the at least one computer to perform operations comprising: receiving a request from a first user device through a first communications channel to establish a session with a system for a user of the first user device; determining that a session established for the user between a second user device and the system through a second communications channel is active; in response to determining that the session with the system through the second communications channel is active, sending an authentication challenge to the second user device through the second communication channel, the authentication challenge comprising a first number of authentication factors; authenticating the first user device for access to the system through the first communications channel based on a response to the authentication challenge received through the first communication channel; and prior to receiving the request from the first user device, establishing the session between the second user device and the system through the second communication channel including by authenticating the second user device using a layered authentication process that comprise multiple authentication factors, at least one of the multiple authentication factors being a username and password combination, wherein the first communications channel is one of a voice channel or a data channel and the second communications channel is the other of the voice channel or the data channel.
“19. The medium of claim 18, the operations further comprising authenticating, prior to determining that the session established between the second user device and the system through the first communications channel is active, the second user device using the second communications channel.”
For the URL and additional information on this patent, see: Voutour,
(Our reports deliver fact-based news of research and discoveries from around the world.)
University of Manitoba Researcher Has Published New Study Findings on Health and Medicine (Role of bilingual guides in access to health care among Indigenous Wayuu population of Colombia): Health and Medicine
Patent Issued for Autonomous vehicle operator identification (USPTO 11748085): State Farm Mutual Automobile Insurance Company
Advisor News
Annuity News
Health/Employee Benefits News
Life Insurance News