Trusted status transfer between associated devices
First Claim
1. A method for authenticating a user device, the method comprising, at a computing device:
- verifying a trusted status for an associated user device, wherein the trusted status indicates an existing authentication for the associated user device;
receiving data items from the associated user device and the user device, wherein the data items include at least (i) a device identifier for the associated user device, (ii) a device identifier for the user device, and iii a data item that indicates that the user device is associated with the associated user device;
determining whether the data items from the associated user device and the user device satisfy a predetermined level of association; and
in response to determining that the data items satisfy the predetermined level of association;
generating an authentication token, andcausing the existing authentication for the associated user device to extend to the user device by sending the authentication token to the associated user device.
1 Assignment
0 Petitions
Accused Products
Abstract
The embodiments set forth systems and techniques to authenticate a user device for device services, such as by transferring or extending a trusted device status from a separate and trusted associated user device, which can be paired with the user device. This can be done automatically without requiring the user to sign in at or on behalf of the user device, and the automated process can include verifying a trusted status for the associated user device, receiving data items from both devices, evaluating the data items, and facilitating an authentication of the user device when the evaluating returns a favorable result. Data items can include provisioned machine identifiers, temporally limited one-time user passwords, and a provisioned password reset key. Authentication or trusted device status transfer can be achieved by way of an authentication token that is given to the user device.
8 Citations
20 Claims
-
1. A method for authenticating a user device, the method comprising, at a computing device:
-
verifying a trusted status for an associated user device, wherein the trusted status indicates an existing authentication for the associated user device; receiving data items from the associated user device and the user device, wherein the data items include at least (i) a device identifier for the associated user device, (ii) a device identifier for the user device, and iii a data item that indicates that the user device is associated with the associated user device; determining whether the data items from the associated user device and the user device satisfy a predetermined level of association; and in response to determining that the data items satisfy the predetermined level of association; generating an authentication token, and causing the existing authentication for the associated user device to extend to the user device by sending the authentication token to the associated user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system adapted to authenticate an electronic device that is associated with a user, the system comprising:
-
at least one processor; and at least one memory storing instructions that, when executed by the at least one processor, cause the system to; verify a trusted status for an associated user device, wherein the trusted status indicates an existing authentication for the associated user device; receive data items from the associated user device and the electronic device, wherein the data items from the associated user device include a unique associated user device identifier and a first one-time password, and the data items from the electronic device include a unique electronic device identifier and a second one-time password; evaluating the data items from the electronic device with the data items from the associated user device; generating an authentication token when evaluating the data items from the electronic device and the associated user device returns a favorable result; and sending the authentication token to the associated user device such that the existing authentication for the associated user device is extended to the electronic device when the associated user device provides the authentication token to the electronic device, wherein extending the existing authentication for the associated user device does not require that the user sign in and manually authenticate the electronic device. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium storing instructions that, when executed by at least one processor included in a computing device, cause the computing device to:
-
verify a trusted status for an associated user device, wherein the trusted status indicates an existing authentication for the associated user device; receive data items from the associated user device and a user device, wherein the data items from the associated user device and the user device include at least (i) a device identifier for the associated user device, (ii) a device identifier for the user device, and (iii) a data item that indicates that the user device is associated with the associated user device; determine whether the data items from the associated user device and the user device satisfy a predetermined level of association; and in response to determining that the data items satisfy the predetermined level of association; generate an authentication token, and cause the existing authentication for the associated user device to extend to the user device by sending the authentication token to the associated user device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification