US 12,081,545 B2
Out-of-band authentication to access web-service with indication of physical access to client device
George Avetisov, New York, NY (US); Bojan Simic, New York, NY (US); and Roman Kadinsky, New York, NY (US)
Assigned to HYPR CORP., New York, NY (US)
Filed by HYPR Corp., New York, NY (US)
Filed on Mar. 28, 2023, as Appl. No. 18/191,399.
Application 18/191,399 is a continuation of application No. 17/501,925, filed on Oct. 14, 2021, granted, now 11,647,023.
Application 17/501,925 is a continuation of application No. 17/234,737, filed on Apr. 19, 2021, granted, now 11,178,148, issued on Nov. 16, 2021.
Application 17/234,737 is a continuation in part of application No. 16/783,028, filed on Feb. 5, 2020, granted, now 11,063,944, issued on Jul. 13, 2021.
Application 16/783,028 is a continuation of application No. 16/270,255, filed on Feb. 7, 2019, granted, now 10,601,828, issued on Mar. 24, 2020.
Claims priority of provisional application 62/720,609, filed on Aug. 21, 2018.
Claims priority of provisional application 62/720,590, filed on Aug. 21, 2018.
Prior Publication US 2023/0362163 A1, Nov. 9, 2023
Int. Cl. H04L 29/06 (2006.01); G06F 21/45 (2013.01); H04L 9/08 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/0884 (2013.01) [G06F 21/45 (2013.01); H04L 9/088 (2013.01); H04L 63/18 (2013.01)] 23 Claims
OG exemplary drawing
 
1. A computer-implemented method, the method comprising:
establishing, by a server system, a record of a user permitted to access a secure asset, the record comprising an identifier associated with the user;
establishing, by the server system, in association with the record of the user, information corresponding to a first device in response to receiving, from the first device, a public key of an asymmetric key-pair, the first device maintaining a private key of the asymmetric key-pair;
receiving information corresponding to an attempt to access the secure asset from a second device different from the first device, the information comprising the identifier associated with the user;
identifying the record of the user responsive to the identifier;
selecting the public key of the asymmetric key-pair associated with the record of the user;
generating notification data comprising a portion of data encrypted based on the public key and operable to be decrypted by the private key maintained by the first device;
determining at least one verification value based on the portion of data in unencrypted form;
transmitting, to the second device, the notification data;
receiving a notification response comprising at least one value for verification;
verifying the at least one value based on the at least one verification value, the verifying indicating whether the first device successfully decrypted the encrypted portion of data using the private key; and
transmitting, based on the verifying indicating that the first device successfully decrypted the encrypted portion of data using the private key, an authentication result to grant the access attempt by the second device.