CPC H04W 12/73 (2021.01) [H04W 12/06 (2013.01); H04W 12/08 (2013.01); H04W 12/47 (2021.01)] | 20 Claims |
1. A method comprising:
receiving, by at least one processor, an electronic access request to add a secondary electronic profile of a secondary user to a primary electronic profile of a primary user;
wherein the electronic access request comprises:
a secondary user identifier identifying the secondary user, and
a primary user identifier identifying the primary user;
determining, by the at least one processor, secondary user contact information associated with the secondary user based at least in part on the secondary user identifier;
determining, by the at least one processor, primary user contact information associated with the primary user based at least in part on the primary user identifier;
generating, by the at least one processor, a plurality of security challenges to authenticate the electronic access request;
sending, by the at least one processor, at least one first security challenge of the plurality of security challenges to the primary user based at least in part on the primary user contact information, and
sending, by the at least one processor, at least one secondary security challenge of the plurality of security challenges to the secondary user based at least in part on the secondary user contact information;
receiving, by the at least one processor, a first response from a primary user device associated with the primary user in response to the at least one first security challenge;
wherein the first response comprises a primary user device identifier identifying the primary user device;
determining, by the at least one processor, a first response time associated with the first response;
receiving, by the at least one processor, a secondary response from a secondary user device associated with the secondary user in response to the at least one secondary security challenge;
wherein the secondary response comprises a secondary user device identifier identifying the secondary user device;
determining, by the at least one processor, a secondary response time associated with the secondary response;
determining, by the at least one processor, a user authentication that authenticates the electronic access request based at least in part on:
the first response being a first valid response to the at least one first security challenge,
the secondary response being a secondary valid response to the at least one secondary security challenge,
the primary user device identifier and the secondary user device identifier being different,
the first response time being within a first predefined time period from sending the at least one first security challenge,
the secondary response time being within a secondary predefined time period from sending the at least one secondary security challenge, and
the first response time and the secondary response time being received within a third predefined time period of each other;
generating, by the at least one processor, the secondary electronic profile as a nested profile within the primary electronic profile, wherein the secondary electronic profile comprises at least one access security permission to allow the secondary user to electronically access the primary electronic profile based at least in part on the secondary user identifier and the user authentication; and
instructing, by the at least one processor, a display of at least one of the primary user device and the secondary user device to display a confirmation of the secondary user being added to the primary electronic profile based at least in part on the access security permission.
|