主权项 |
1. A system for authentication utilizing a physical break in an electronic pathway, the system comprising:
a primary device comprising a wireless transceiver; a secondary device comprising a first section and a second section, the first section movable in relation to the second section, the first section comprising a first electrical connector, a Global positioning system (“GPS”) component, a transceiver for receiving authentication data over a network and a memory for storing the authentication data, the second section comprising a second electrical connector, a wireless transceiver for communicating with the primary device; and an authentication server comprising a key and a key cylinder, the key comprising a combination of numbers, letters and/or symbols and the key cylinder comprising a combination of numbers, letters and/or symbols; wherein: the primary device is configured to transmit an authentication request to the authentication server for access to secure data or a secure site; the authentication server is configured to transmit a validation request to the secondary device in response to the authentication request; the secondary device is configured to transmit a GPS location and an unique user identification (“UUID”) to the authentication server in response to the validation request to indicate proximity of the secondary device to the primary device and the authenticity of the secondary device; upon validation of the GPS location and the UUID of the secondary device, the authentication server is configured to transmit the key and a solution to the primary device and the key cylinder to the secondary device; the secondary device is configured to generate a notification to a user to mechanically move the first section in relation to the second section when the key cylinder is received at the secondary device; the first section is configured to move in relation to the second section to position the first electrical connector of the first section in contact with the second electrical connector of the second section to close a circuit on the secondary device; upon the confirmation that the circuit is closed, the secondary device is configured to transmit the key cylinder to the primary device; and the primary device is configured to combine the key with the received key cylinder and test the solution to authenticate the primary device to gain access to the secure data or the secure site. |