Authentication using third-party data
First Claim
1. A method comprising:
- establishing, by a computing device of a service provider, authentication data for authenticating a user of a service provided by the service provider, wherein the authentication data for the user comprises one or more first data entries and one or more second data entries that correspond to the one or more first data entries, wherein the one or more first data entries are stored at the computing device, and wherein the one or more second data entries are maintained by at least one third-party service provider;
receiving, by the computing device and from a user device, a request to authenticate the user to access the service provided by the service provider;
in response to the request, generating, by the computing device, an authentication challenge comprising a plurality of user selectable data entries that include the one or more first data entries;
receiving, by the computing device and from the user device, input that indicates a selection of the one or more first data entries from the plurality of user selectable data entries;
retrieving, by the computing device and from a user account of the user at the at least one third-party service provider, the one or more second data entries that correspond to the selection of the one or more first data entries; and
authenticating, by the computing device, the user to access the service provided by the service provider based on the authentication data for the user, wherein authenticating the user comprises comparing the one or more first data entries stored at the computing device to the one or more second data entries retrieved from the user account of the user at the at least one third-party service provider.
1 Assignment
0 Petitions
Accused Products
Abstract
In an example, techniques of this disclosure include establishing, by a computing device, authentication data for authenticating a user of a service provided by a service provider, where the authentication data comprises one or more first data entries and one or more second data entries that correspond to the one or more first data entries. The techniques also include retrieving, from at least one third-party service provider, one or more second data entries maintained by the at least one third-party service provider that correspond to the one or more first data entries, and authenticating the user based on the authentication data, where authenticating the user comprises comparing the one or more first data entries to the one or more second data entries retrieved from the at least one third-party service provider.
-
Citations
20 Claims
-
1. A method comprising:
-
establishing, by a computing device of a service provider, authentication data for authenticating a user of a service provided by the service provider, wherein the authentication data for the user comprises one or more first data entries and one or more second data entries that correspond to the one or more first data entries, wherein the one or more first data entries are stored at the computing device, and wherein the one or more second data entries are maintained by at least one third-party service provider; receiving, by the computing device and from a user device, a request to authenticate the user to access the service provided by the service provider; in response to the request, generating, by the computing device, an authentication challenge comprising a plurality of user selectable data entries that include the one or more first data entries; receiving, by the computing device and from the user device, input that indicates a selection of the one or more first data entries from the plurality of user selectable data entries; retrieving, by the computing device and from a user account of the user at the at least one third-party service provider, the one or more second data entries that correspond to the selection of the one or more first data entries; and authenticating, by the computing device, the user to access the service provided by the service provider based on the authentication data for the user, wherein authenticating the user comprises comparing the one or more first data entries stored at the computing device to the one or more second data entries retrieved from the user account of the user at the at least one third-party service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computing device of a service provider, the computing device comprising:
-
one or more memory units configured to store one or more first data entries of authentication data for a user; and one or more processors configured to; establish the authentication data for authenticating the user of a service provided by the service provider, wherein the authentication data for the user comprises the one or more first data entries and one or more second data entries that correspond to the one or more first data entries, wherein the one or more second data entries are maintained by at least one third-party service provider; receive, from a user device, a request to authenticate the user to access the service provided by the service provider; in response to the request, generate an authentication challenge comprising a plurality of user selectable data entries that include the one or more first data entries; receive, from the user device, input that indicates a selection of the one or more first data entries from the plurality of user selectable data entries; retrieve, from a user account of the user at the at least one third-party service provider, the one or more second data entries that correspond to the selection of the one or more first data entries; and authenticate the user to access the service provided by the service provider based on the authentication data for the user, wherein the one or more processors are further configured to compare the one or more first data entries stored in the one or more memory units to the one or more second data entries retrieved from the user account of the user at the at least one third-party service provider. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer readable medium having instructions stored thereon that, when executed, cause one or more processors of a computing device of a service provider to:
-
establish authentication data for authenticating a user of a service provided by the service provider, wherein the authentication data for the user comprises one or more first data entries and one or more second data entries that correspond to the one or more first data entries, wherein the one or more first data entries are stored at the computing device, and wherein the one or more second data entries are maintained by at least one third-party service provider; receive, from a user device, a request to authenticate the user to access the service provided by the service provider; in response to the request, generate an authentication challenge comprising a plurality of user selectable data entries that include the one or more first data entries; receive, from the user device, input that indicates a selection of the one or more first data entries from the plurality of user selectable data entries; retrieve, from a user account of the user at the at least one third-party service provider, the one or more second data entries that correspond to the selection of the one or more first data entries; and authenticate the user to access the service provided by the service provider based on the authentication data for the user, wherein authenticating the user comprises comparing the one or more first data entries stored at the computing device to the one or more second data entries retrieved from the user account of the user at the at least one third-party service provider.
-
Specification