Efficient logon
First Claim
Patent Images
1. A method comprising:
- detecting a plurality of devices within a detectable range of an enterprise device using at least one of near-field communications, radio frequency identification, or Bluetooth;
selecting a user profile from a plurality of user profiles associated with the plurality of devices to determine an authentication challenge for access to one or more enterprise services, wherein selecting the user profile is based on characteristics of the plurality of user profiles,wherein the user profile indicates the authentication challenge for access to the one or more enterprise services using the enterprise device, and wherein selecting the user profile from the plurality of user profiles based on the characteristics of the plurality of user profiles comprises determining which user profile indicates that the enterprise device is a primary enterprise device of the user profile;
requesting authentication information based on the authentication challenge indicated in the user profile;
receiving the authentication information;
verifying the authentication information; and
granting, to a user associated with the device, the access to the one or more enterprise services when the authentication information has been successfully verified.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for efficiently logging in or onto a computer system or other restricted system are described. An enterprise device may detect that a user device is within a detectable range of the user device. A user profile associated with the user device may be identified. The user and/or the user device may provide authentication information to the enterprise device, and the user may be granted access when the authentication information has been verified.
-
Citations
19 Claims
-
1. A method comprising:
-
detecting a plurality of devices within a detectable range of an enterprise device using at least one of near-field communications, radio frequency identification, or Bluetooth; selecting a user profile from a plurality of user profiles associated with the plurality of devices to determine an authentication challenge for access to one or more enterprise services, wherein selecting the user profile is based on characteristics of the plurality of user profiles, wherein the user profile indicates the authentication challenge for access to the one or more enterprise services using the enterprise device, and wherein selecting the user profile from the plurality of user profiles based on the characteristics of the plurality of user profiles comprises determining which user profile indicates that the enterprise device is a primary enterprise device of the user profile; requesting authentication information based on the authentication challenge indicated in the user profile; receiving the authentication information; verifying the authentication information; and granting, to a user associated with the device, the access to the one or more enterprise services when the authentication information has been successfully verified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium containing a set of instructions that, when executed by one or more processors, cause a machine to:
-
detect a plurality of devices within a detectable range of an enterprise device using at least one of near-field communications, radio frequency identification, or Bluetooth; select a user profile from a plurality of user profiles associated with the plurality of devices to determine an authentication challenge for access to one or more enterprise services, wherein selecting the user profile is based on characteristics of the plurality of user profiles, wherein the user profile indicates the authentication challenge for access to the one or more enterprise services using the enterprise device, and wherein selecting the user profile from the plurality of user profiles based on the characteristics of the plurality of user profiles comprises determining which user profile indicates that the enterprise device is a primary enterprise device of the user profile; request authentication information based on the authentication challenge indicated in the user profile; receive the authentication information; verify the authentication information; and grant, to a user associated with the device, the access to the one or more enterprise services when the authentication information has been successfully verified. - View Dependent Claims (16, 17)
-
-
18. A system comprising:
-
a database comprising; a plurality of user profiles associated with a plurality of devices, the plurality of user profiles including authentication information and authentication challenges; a detection module configured to; receive signals from the plurality of devices located within a detectable range of an enterprise device, wherein the signals identify the plurality of devices located within the detectable range of the enterprise device; a user profile module configured to; access, from the database, the plurality of user profiles associated with the identified plurality of devices, and select a user profile from the plurality of user profiles to determine an authentication challenge for access to one or more enterprise services, wherein selecting the user profile is based on characteristics of the plurality of user profiles, and wherein selecting the user profile from the plurality of user profiles based on the characteristics of the plurality of user profiles comprises determining which user profile indicates that the enterprise device is a primary enterprise device of the user profile; an authentication request module configured to; request authentication information based on the authentication challenges indicated in the user profile, receive the authentication information, and verify the authentication information; and a logon module configured to; grant access to the one or more enterprise services when the authentication information has been successfully verified. - View Dependent Claims (19)
-
Specification