| CPC H04L 63/083 (2013.01) [H04L 63/10 (2013.01)] | 9 Claims |

|
1. A computer-implemented method for authorizing a service, the method comprising:
receiving first user data at a first authenticator device located at a first location,
generating, at the first authenticator device, first authentication data based on the first user data, generating, at the first authenticator device, an associated first security encryption token for the first authentication data, and linking the first security encryption token to the first authentication data,
forwarding, at the first authenticator device, the first authentication data and the linked first security encryption token to a user device,
receiving second user data that is different from the first user data at a second authenticator device located at a second location that is located remote from the first location,
generating, at the second authenticator device, second authentication data based on the second user data, generating, at the second authenticator device, an associated second security encryption token for the second authentication data, and linking the second security encryption token to the second authentication data,
forwarding, at the second authenticator device, the second authentication data and the linked second security encryption token to the user device;
receiving, at a service device, a service request from a user via the user device,
receiving, at the service device, the first authentication data from the user device via a first data channel,
receiving, at the service device, the second authentication data from the user device via a second data channel that is different from the first data channel,
calculating, at the service device, an authentication score, by comparing the first and second authentication data to a pre-defined threshold associated with the user, and
authorizing the requested service if the authentication score exceeds the predefined threshold.
|