Controlling access to online resources using device validations
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving, by one or more computing devices, a request to engage in a verification process for a first user device to gain access to an online resource during a web session;
responsive to receiving the request to engage in the verification process, providing, by the one or more computing devices and to the first user device, a challenge token comprising data identifying a communication session between the one or more computing devices and the first user device;
receiving, by the one or more computing devices and from a second user device to which the web session has been connected;
a copy of the challenge token forwarded by the first user device to the second user device using a short-range communication technique and in response to a determination that the first user device is a non-mobile user device, anda validation request comprising a device profile associated with the second user device;
determining, by the one or more computing devices, whether to validate the second user device based at least in part on;
the validation request, anda determination of whether the device profile associated with the second user device aligns with or otherwise matches one or more acceptable device configurations indicating that the first user device is being operated by a human; and
responsive to successfully validating the second user device, granting, by the one or more computing devices, the first user device access to the online resource.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods of verifying a user are provided. In particular, a request to engage in a verification process to gain access to an online resource can be received. The request can be provided by a first user device associated with a user. A validation request associated with a second user device associated with the user can be received. The validation request can include a device profile associated with the second user device. It can then be determined whether to validate the second user device based at least in part on the device profile. When it is determined to validate the second user device, the first user device can be granted access to the online resource.
13 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
receiving, by one or more computing devices, a request to engage in a verification process for a first user device to gain access to an online resource during a web session; responsive to receiving the request to engage in the verification process, providing, by the one or more computing devices and to the first user device, a challenge token comprising data identifying a communication session between the one or more computing devices and the first user device; receiving, by the one or more computing devices and from a second user device to which the web session has been connected; a copy of the challenge token forwarded by the first user device to the second user device using a short-range communication technique and in response to a determination that the first user device is a non-mobile user device, and a validation request comprising a device profile associated with the second user device; determining, by the one or more computing devices, whether to validate the second user device based at least in part on; the validation request, and a determination of whether the device profile associated with the second user device aligns with or otherwise matches one or more acceptable device configurations indicating that the first user device is being operated by a human; and responsive to successfully validating the second user device, granting, by the one or more computing devices, the first user device access to the online resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
one or more processors; and a memory storing instructions that when executed by the one or more processors cause the system to perform operations comprising; receiving a request to engage in a verification process for a first user device to gain access to an online resource during a web session; responsive to receiving the request to engage in the verification process, providing, to the first user device, a challenge token comprising data identifying a communication session between the system and the first user device; receiving, from a second user device to which the web session has been connected; a copy of the challenge token forwarded by the first user device to the second user device using a short-range communication technique and in response to a determination that the first user device is a non-mobile user device, and a validation request comprising a device profile associated with the second user device; determining whether to validate the second user device based at least in part on; the validation request, and a determination of whether the device profile associated with the second user device aligns with or otherwise matches one or more acceptable device configurations indicating that the first user device is being operated by a human; and responsive to successfully validating the second user device, granting the first user device access to the online resource. - View Dependent Claims (14, 15, 16)
-
-
17. One or more non-transitory computer-readable media comprising instructions that when executed by one or more computers cause the one or more computers to perform operations comprising:
-
receiving a request to engage in a verification process for a first user device to gain access to an online resource during a web session; responsive to receiving the request to engage in the verification process, providing, to the first user device, a challenge token comprising data identifying a communication session between the one or more computers and the first user device; receiving, from a second user device to which the web session has been connected; a copy of the challenge token forwarded by the first user device to the second user device using a short-range communication technique and in response to a determination that the first user device is a non-mobile user device, and a validation request comprising a device profile associated with the second user device; determining whether to validate the second user device based at least in part on; the validation request, and a determination of whether the device profile associated with the second user device aligns with or otherwise matches one or more acceptable device configurations indicating that the first user device is being operated by a human; and responsive to successfully validating the second user device, granting the first user device access to the online resource. - View Dependent Claims (18, 19, 20)
-
Specification