Identity authentication using multiple devices
First Claim
Patent Images
1. A computer-implementable method, comprising:
- registering a first user device associated with a user with an information handling system;
registering a second user device associated with the user with the information handling system;
determining that the first user device and the second user device are connected to a network associated with the information handling system;
receiving an authentication request from the first user device, the authentication request including an identifier of the first user device;
accessing an electronic record of the user based on the first user device to determine an identity of the user and other user devices that are registered with the user;
identifying the second user device in the electronic record;
determining that the first user device and the second user device are within a predetermined range of the information handling system based on a detected signal strength for each of the first user device and the second user device to the network;
determining a confidence value based on at least one of;
the first user device, the second user device, a type of device for the first user device, and a type of device of the second user device; and
authenticating the user as an authorized user of the information handling system (a) based on the first user device and the second device both being connected to the network, (b) when both the first user device and the second device are within the predetermined range of the information handling system, the authenticating using the first user device and the second user device to confirm an identity of the user for the user to access the information handling system, and (c) based on the confidence value being within a confidence value threshold.
22 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer-readable medium for performing an authentication operation comprising: identifying a plurality of user devices associated with a user of an information handling system; determining when at least some of the plurality of user devices are within a predetermined range of the information handling system; and, authenticating the user as an authorized user of the information handling system when at least some of the plurality of user devices are within the predetermined range of the information handling system.
-
Citations
18 Claims
-
1. A computer-implementable method, comprising:
-
registering a first user device associated with a user with an information handling system; registering a second user device associated with the user with the information handling system; determining that the first user device and the second user device are connected to a network associated with the information handling system; receiving an authentication request from the first user device, the authentication request including an identifier of the first user device; accessing an electronic record of the user based on the first user device to determine an identity of the user and other user devices that are registered with the user; identifying the second user device in the electronic record; determining that the first user device and the second user device are within a predetermined range of the information handling system based on a detected signal strength for each of the first user device and the second user device to the network; determining a confidence value based on at least one of;
the first user device, the second user device, a type of device for the first user device, and a type of device of the second user device; andauthenticating the user as an authorized user of the information handling system (a) based on the first user device and the second device both being connected to the network, (b) when both the first user device and the second device are within the predetermined range of the information handling system, the authenticating using the first user device and the second user device to confirm an identity of the user for the user to access the information handling system, and (c) based on the confidence value being within a confidence value threshold. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a processor; a data bus coupled to the processor; and a non-transitory, computer-readable storage medium embodying computer program code, the non-transitory, computer-readable storage medium being coupled to the data bus, the computer program code interacting with a plurality of computer operations and comprising instructions that, when executed by the processor, cause the system to perform operations comprising; register a first user device associated with a user with an information handling system; register a second user device associated with the user with the information handling system; determine that the first user device and the second user device are connected to a network associated with the information handling system receive an authentication request from the first user device, the authentication request including an identifier of the first user device; access an electronic record of the user based on the first user device to determine an identity of the user and other user devices that are registered with the user; identify the second user device in the electronic record; determine that the first user device and the second user device are within a predetermined range of the information handling system based on a detected signal strength for each of the first user device and the second user device to the network; and
,determine a confidence value based on at least one of;
the first user device, the second user device, a type of device for the first user device, and a type of device of the second user device;authenticate the user as an authorized user of the information handling system (a) based on the first user device and the second device both being connected to the network, (b) when both the first user device and the second device are within the predetermined range of the information handling system, the authenticating using the first user device and the second user device to confirm an identity of the user for the user to access the information handling system, and (c) based on the confidence value being within a confidence value threshold. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory, computer-readable storage medium embodying computer program code, the computer program code comprising computer executable instructions that, when executed by a processor, cause a system to perform operations comprising:
-
registering a first user device associated with a user with an information handling system; registering a second user device associated with the user with the information handling system; determining that the first user device and the second user device are connected to a network associated with the information handling system; receiving an authentication request from the first user device, the authentication request including an identifier of the first user device; accessing an electronic record of the user based on the first user device to determine an identity of the user and other user devices that are registered with the user; identifying the second user device in the electronic record; determining that the first user device and the second user device are within a predetermined range of the information handling system based on a detected signal strength for each of the first user device and the second user device to the network; determining a confidence value based on at least one of;
the first user device, the second user device, a type of device for the first user device, and a type of device of the second user device; andauthenticating the user as an authorized user of the information handling system (a) based on the first user device and the second device both being connected to the network, (b) when both the first user device and the second device are within the predetermined range of the information handling system, the authenticating using the first user device and the second user device to confirm an identity of the user for the user to access the information handling system, and (c) based on the confidence value being within a confidence value threshold. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification