Bootstrapping user authentication on devices
First Claim
1. A non-transitory computer-readable medium embodying a program that, when executed in at least one computing device, causes the at least one computing device to at least:
- authenticate a first application executed on a first computing device to access a user account on a network site based at least in part on a trusted security credential received from the first application, the first application providing at least one visual cue indicating that a first current network page is legitimate;
send a bootstrap security credential to the first application that has been authenticated;
display, by the first application, a first user interface containing the bootstrap security credential and a site verification credential;
display, by a second computing device, a second user interface configured to receive the bootstrap security credential from a user and present the site verification credential; and
authenticate a second application executed on the second computing device for access to the user account on the network site based at least in part on the bootstrap security credential being manually entered in the second user interface and received from the second application in an authentication request that excludes the trusted security credential, the second application omitting visual cues to indicate a second current network page is legitimate.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments that facilitate bootstrapping authentication of a user at a first device using a second device. The second device is authenticated for access to a user account via a first security credential. A second security credential is received by the second device. The second security credential is then sent to the first device. Subsequently, the second security credential is received from the first device, and the first device is authenticated for access to the user account. The second device includes visual cues to indicate a network page is legitimate, while the first device excludes visual cues to indicate the network page is legitimate.
-
Citations
19 Claims
-
1. A non-transitory computer-readable medium embodying a program that, when executed in at least one computing device, causes the at least one computing device to at least:
-
authenticate a first application executed on a first computing device to access a user account on a network site based at least in part on a trusted security credential received from the first application, the first application providing at least one visual cue indicating that a first current network page is legitimate; send a bootstrap security credential to the first application that has been authenticated; display, by the first application, a first user interface containing the bootstrap security credential and a site verification credential; display, by a second computing device, a second user interface configured to receive the bootstrap security credential from a user and present the site verification credential; and authenticate a second application executed on the second computing device for access to the user account on the network site based at least in part on the bootstrap security credential being manually entered in the second user interface and received from the second application in an authentication request that excludes the trusted security credential, the second application omitting visual cues to indicate a second current network page is legitimate. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system, comprising:
-
a data store storing user account data; and at least one computing device comprising a hardware processor in communication with the data store, the at least one computing device being configured to at least; authenticate a first application executed on a first device for access to a user account on a network site based at least in part on the user account data, the first application providing at least one visual cue indicating that a first current network page is legitimate; receive a request for a bootstrap security credential from the first application that has been authenticated; send the bootstrap security credential to the first application; cause the first application to display a first user interface containing the bootstrap security credential and a site verification credential; receive a request from a second application executed on a second device for access to the user account on the network site; cause the second application to display a second user interface configured to receive the bootstrap security credential from a user and present the site verification credential; and authenticate the second application for access to the user account on the network site based at least in part on the bootstrap security credential being received from the second application, wherein the bootstrap security credential is manually entered in the second application, the bootstrap security credential excluding the user account data, and the second application excluding the at least one visual cue to indicate a second current network page is legitimate. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
authenticating, via at least one of one or more computing devices, a first computing device to access a user account based at least in part on a security credential received from the first computing device, the first computing device providing at least one visual cue indicating that a first current application is legitimate; generating, via at least one or more of the one or more computing devices, a bootstrap security credential for the user account; causing the first computing device to display a first user interface containing the bootstrap security credential and a site verification credential; causing a second computing device to display a second user interface configured to receive the bootstrap security credential from a user and present the site verification credential; and authenticating, via at least one or more of the one or more computing devices, the second computing device for access to the user account based at least in part on the bootstrap security credential being manually entered in the second user interface, the bootstrap security credential received from the second computing device in an authentication request from the second computing device that excludes the security credential, the second computing device excluding visual cues indicating that a second current application executed by the second computing device is legitimate. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification