Authentication on a computing device
First Claim
Patent Images
1. A method comprising:
- receiving, by a computing system, from a first computing device, an authentication request to access an application or service provided by the computing system, the authentication request including a user id that uniquely identifies a user of the first computing device and a device id that uniquely identifies the first computing device;
responsive to receiving the authentication request, causing, by the computing system, a second computing device to present an authentication acceptance screen, wherein the user of the first computing device is already authenticated on the second computing device to access the application or service provided by the computing system when the computing system causes the second computing device to present the authentication screen;
after causing the second computing device to present the authentication acceptance screen, receiving, by the computing system, from the second computing device, a user response to the authentication acceptance screen;
determining, by the computing system, based at least in part on the user response to the authentication acceptance screen, whether to accept the authentication request; and
responsive to accepting the authentication request, granting, by the computing system, to the first computing device, access to the application or service provided by the computing system.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and/or methods provide a user of a first computing device with the ability to authenticate themselves on a remotely provided process or service using a second computing device on which the user is already authenticated. For example, the techniques of this disclosure provide a user with the ability to securely log into a remotely provided service or application (such as e-mail, cloud computing service, etc.) on a first computing device (e.g., a desktop computer, laptop, tablet, etc.) using a second computing device (e.g., mobile phone) on which the user is already logged into the service or application, without requiring manual entry of authentication information on the first computing device.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a computing system, from a first computing device, an authentication request to access an application or service provided by the computing system, the authentication request including a user id that uniquely identifies a user of the first computing device and a device id that uniquely identifies the first computing device; responsive to receiving the authentication request, causing, by the computing system, a second computing device to present an authentication acceptance screen, wherein the user of the first computing device is already authenticated on the second computing device to access the application or service provided by the computing system when the computing system causes the second computing device to present the authentication screen; after causing the second computing device to present the authentication acceptance screen, receiving, by the computing system, from the second computing device, a user response to the authentication acceptance screen; determining, by the computing system, based at least in part on the user response to the authentication acceptance screen, whether to accept the authentication request; and responsive to accepting the authentication request, granting, by the computing system, to the first computing device, access to the application or service provided by the computing system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing system comprising:
at least one processor configured to; receive, from a first computing device, an authentication request to access an application or service provided by the computing system, the authentication request including a user id that uniquely identifies a user of the first computing device and a device id that uniquely identifies the first computing device; responsive to receiving the authentication request, cause a second computing device to present an authentication acceptance screen, wherein the user of the first computing device is already authenticated on the second computing device to access the application or service provided by the computing system when the computing system causes the second computing device to present the authentication screen; after causing the second computing device to present the authentication acceptance screen, receive, from the second computing device, a user response to the authentication acceptance screen; determine, based at least in part on the user response to the authentication acceptance screen, whether to accept the authentication request; and responsive to accepting the authentication request, grant, to the first computing device, access to the application or service provided by the computing system. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
16. A method comprising:
-
accessing, by a second computing device, via a computing system, a remote application or service, wherein a user of the second computing device is authenticated by the computing system to access the remote application or service; while the user of the second computing device is authenticated by the computing system to access the remote application or service, receiving, by the second computing device, from the computing system, an authentication request to access the application or service provided by the computing system that was transmitted by a first computing device, the authentication request including a user id that uniquely identifies the user of the second computing device as being a user of the first computing device and a device id that uniquely identifies the first computing device; responsive to receiving the authentication request, displaying, at a touch screen of the second computing device, an authentication acceptance screen; while displaying the authentication acceptance screen, detecting, by the second computing device, one or more gestures entered by the user at a region of the touch screen of the second computing device at which the authentication acceptance screen is displayed; and responsive to detecting the one or more gestures, transmitting, by the second computing device, to the computing system, a user response to the authentication acceptance screen, wherein the computing system is configured to allow or deny access to the remote application or service from the first computing device based at least in part on the user response to the authentication acceptance screen. - View Dependent Claims (17, 18, 19, 20)
-
Specification