US 12,452,231 B2
Method for authorizing a service
Justin Long, Kennesaw, GA (US)
Assigned to DIGITAL FIRST HOLDINGS LLC, Atlanta, GA (US)
Filed by DIGITAL FIRST HOLDINGS LLC, Atlanta, GA (US)
Filed on Jun. 30, 2023, as Appl. No. 18/217,194.
Prior Publication US 2025/0007904 A1, Jan. 2, 2025
Int. Cl. G06F 21/00 (2013.01); H04L 9/40 (2022.01)
CPC H04L 63/083 (2013.01) [H04L 63/10 (2013.01)] 9 Claims
OG exemplary drawing
 
1. A computer-implemented method for authorizing a service, the method comprising:
receiving first user data at a first authenticator device located at a first location,
generating, at the first authenticator device, first authentication data based on the first user data, generating, at the first authenticator device, an associated first security encryption token for the first authentication data, and linking the first security encryption token to the first authentication data,
forwarding, at the first authenticator device, the first authentication data and the linked first security encryption token to a user device,
receiving second user data that is different from the first user data at a second authenticator device located at a second location that is located remote from the first location,
generating, at the second authenticator device, second authentication data based on the second user data, generating, at the second authenticator device, an associated second security encryption token for the second authentication data, and linking the second security encryption token to the second authentication data,
forwarding, at the second authenticator device, the second authentication data and the linked second security encryption token to the user device;
receiving, at a service device, a service request from a user via the user device,
receiving, at the service device, the first authentication data from the user device via a first data channel,
receiving, at the service device, the second authentication data from the user device via a second data channel that is different from the first data channel,
calculating, at the service device, an authentication score, by comparing the first and second authentication data to a pre-defined threshold associated with the user, and
authorizing the requested service if the authentication score exceeds the predefined threshold.