Authentication with secondary approver
First Claim
1. A system comprising:
- a first device logged into a first user account and configured to request authorization to perform a restricted activity on the first device by transmitting a request signal through a network before performing the restricted activity, receive an authorizing signal through the network, and perform the restricted activity in response to receiving the authorizing signal, wherein the restricted activity includes accessing restricted content; and
a second device logged into a second user account and configured to receive the request signal from the first device through the network, display an authentication input for authenticating an authorized user associated with the second user account, display an authorization input for authorizing the restricted activity on the first device, and transmit the authorizing signal through the network if the second device is authenticated and if the first device is authorized, wherein content on the first device that is common to the first user account and the second user account is not restricted content.
0 Assignments
0 Petitions
Accused Products
Abstract
Techniques are provided for giving access to restricted content on a first device from a second device through a wireless network. In one embodiment, the first device transmits an authorization request signal to the second device or to a server in the wireless network. The second device, having received the authorization request, prompts an authorized user to give authorization to the first device by inputting an authentication key such as a password car gesture on the second device. Upon verification of the authentication key, an authorization signal may be wirelessly transmitted to the first device, permitting access to the restricted content or functions on the first device. In some embodiments, the second device may be alerted to an authorization request and may elect a request for authorization from a selectable queue of requests.
695 Citations
28 Claims
-
1. A system comprising:
-
a first device logged into a first user account and configured to request authorization to perform a restricted activity on the first device by transmitting a request signal through a network before performing the restricted activity, receive an authorizing signal through the network, and perform the restricted activity in response to receiving the authorizing signal, wherein the restricted activity includes accessing restricted content; and a second device logged into a second user account and configured to receive the request signal from the first device through the network, display an authentication input for authenticating an authorized user associated with the second user account, display an authorization input for authorizing the restricted activity on the first device, and transmit the authorizing signal through the network if the second device is authenticated and if the first device is authorized, wherein content on the first device that is common to the first user account and the second user account is not restricted content. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving, by a device associated with a first user account, request to access content on the device; and when the content is restricted for the first user account, requesting authorization, from a second user account, to access the restricted content on the device, wherein content that is common to the first user account and the second user account is not restricted. - View Dependent Claims (8, 9, 10)
-
-
11. A method comprising:
-
receiving, by a device, a request for authorization to access restricted content on the device by a first user account logged into the device; and determining, through a second user account logged into the device, whether to authorize the access to the restricted content on the device by the first user account. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium having executable instructions to cause a processor on a device to perform operations comprising:
-
receiving a request from a first user account to access content on a device; and when the content is restricted for the first user account, requesting authorization, from a second user account, to access the restricted content on the device by the first user account, wherein content that is common to the first user account and the second user account is not restricted. - View Dependent Claims (17, 18, 19)
-
-
20. A non-transitory computer-readable storage medium having executable instructions to cause a processor on a device to perform operations comprising:
-
receiving a request for authorization to access restricted content on a device by a user account logged into the device; and determining, through a second user account logged into the device, whether to authorize the access to the restricted content on the device by the first user account, wherein content that is common to the first user account and the second user account is not restricted. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A device comprising:
-
one or more processors; a network interface coupled to the one or more processors through the bus; and a memory coupled to the one or more processors through the bus, the memory storing instructions to cause the one or more processors to receive a request from a first user account to access content on the device; and when the content is restricted for the first user account, transmitting, through the network interface, a request for authorization from a second user account to access the restricted content on the device by the first user account, wherein content that is common to the first user account and the second user account is not restricted. - View Dependent Claims (26)
-
-
27. A device comprising:
-
one or more processors; a network interface coupled to the one or more processors through a bus; and a memory coupled to the one or more processors through the bus, the memory storing instructions to cause the one or more processors to receive, through the network interface, a request for authorization to access restricted content on the device by a first user account logged into the device; and determine, through a second user account logged into the device, whether to authorize the access to the restricted content on the device by the first user account, wherein content that is common to the first user account and the second user account is not restricted. - View Dependent Claims (28)
-
Specification