×

Authenticator centralization and protection

  • US 10,250,602 B2
  • Filed: 08/28/2018
  • Issued: 04/02/2019
  • Est. Priority Date: 09/21/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for authenticating a user who is communicating with an enterprise via a user device, comprising:

  • receiving authenticators for a user and storing the received authenticators;

    receiving, from the enterprise, a request to authenticate the user with an authentication policy for authenticating the user, wherein the request does not identify which of the stored authenticators is to be used for authenticating the user;

    determining whether the stored authenticators include a first authenticator to be used for authenticating the user based on the authentication policy;

    when the stored indicators include the first authenticator, transmitting an authentication request to the user device requesting the first authenticator, receiving, from the user device, an authenticator in response to the authentication request, and authenticating the user by comparing the received authenticator with the stored first authenticator; and

    when the stored authenticators do not include the first authenticator, transmitting to the entity an identification of at least one of the stored authenticators, for the entity to determine if the at least one of stored authenticators is to be used for authentication.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×