CPC H04L 63/0892 (2013.01) [H04L 9/321 (2013.01); H04L 9/3228 (2013.01); H04L 63/0838 (2013.01); H04L 2463/082 (2013.01)] | 20 Claims |
1. A system for security authentication comprising:
a plurality of computing devices; and
a server system communicatively coupled to the plurality of computing devices, the server system comprising a non-transitory memory comprising computer program code and a processor, wherein execution of the computer program code causes the server system to:
generate a pre-configured authentication preference scheme based on authentication preferences comprising at least one of preferred authorization providers, preferred authorization provider mode of communication, response timing preferences, and a preferred prioritization scheme for authorization providers, wherein a preferred authorization provider from among the preferred authorization providers is included in the pre-configured authentication preference scheme after an elapse of an initiation time period, and the preferred authorization provider is prohibited from the pre-configured authentication preference scheme during the initiation time period;
store, in a database communicatively coupled to the server system, the generated pre-configured authentication preference scheme;
receive, from an initiating computing device from among the plurality of computer devices, a request for security authentication;
determine an authorization providing computing device from among the plurality of computer devices based on the pre-configured authentication preference scheme, wherein the initiating computing device is distinct from the authorization providing computing device;
generate and transmit authentication information to the determined authorization providing computing device in accordance with a preferred authorization provider mode of communication;
receive, from the initiating computing device, an authentication input;
determine whether the received authentication input matches the transmitted authentication information; and
complete the request for security authentication when the received authentication input matches the generated and transmitted authentication information and the received authentication input is received within a predetermined time-out period.
|