×

Authenticator centralization and protection

  • US 10,084,782 B2
  • Filed: 09/19/2016
  • Issued: 09/25/2018
  • Est. Priority Date: 09/21/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for authenticating a user who is communicating with an enterprise via a network, comprising:

  • receiving, via the network, authenticators for a user from a first user device associated with the user, and storing the received authenticators;

    receiving, from the enterprise, a request to authenticate the user with an authentication policy for authenticating the user, wherein the request does not identify which of the stored authenticators is to be used for authenticating the user;

    determining, a first authenticator from the stored authenticators to be used for authenticating the user based on the authentication policy received from the enterprise;

    transmitting an authentication request to the first user device via the network requesting the first authenticator;

    receiving, from the first user device via the network, an authenticator in response to the authentication request; and

    authenticating the user by comparing the received authenticator with the stored first authenticator.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×