Electronic credential and analytics integration
First Claim
1. A computer implemented method comprising:
- receiving, by a restricted access system and from a client device, a request for access to the restricted access system for a user;
transmitting, by the restricted access system and to a credential management system, a request to authenticate the user, wherein the credential management system maintains a credential for the user and determines that the user has not accessed the credential through a credential management application on a mobile device;
in response to the request to authenticate the user and based on the credential management system maintaining the credential for the user and determining that the user has not accessed the credential through the credential management application on the mobile device, receiving, by the restricted access system and from the credential management system, (i) challenge data, (ii) instructions to output, on a display of the client device, a representation of the challenge data, (iii) instructions to output, on the display of the client device, a request to install the credential management application on the mobile device, and (iv) instructions to output, on the display of the client device, directions to interact with the representation of the challenge data using the credential management application on the mobile device;
transmitting, by the restricted access system and to the client device, (i) the challenge data, (ii) the instructions to output, on the display of the client device, a representation of the challenge data, (iii) the instructions to output, on the display of the client device, the request to install the credential management application on the mobile device, and (iv) the instructions to output, on the display of the client device, the directions to interact with the representation of the challenge data using the credential management application on the mobile device;
receiving, by the restricted access system and from the credential management system, a token indicating that the credential management system authenticated the user based on the user interacting, through the credential management application on the mobile device, with the representation of the challenge data that was output on the display of the client device; and
in response to receiving the token, opening, by the restricted access system, a session between the client device and the restricted access system.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for electronic credential and analytics integrations are described. In one aspect, a method includes the actions of receiving, by a restricted access system and from a client device, a request for access to the restricted access system for a user. The actions further include transmitting a request to authenticate the user. The actions further include receiving, by the restricted access system and from the credential management system, challenge data. The actions further include transmitting the challenge data. The actions further include receiving a token indicating that the credential management system authenticated the user based on the user interacting with a representation of the challenge data that was provided to the client device. The actions further include in response to receiving the token, opening a session between the client device and the restricted access system.
-
Citations
20 Claims
-
1. A computer implemented method comprising:
-
receiving, by a restricted access system and from a client device, a request for access to the restricted access system for a user; transmitting, by the restricted access system and to a credential management system, a request to authenticate the user, wherein the credential management system maintains a credential for the user and determines that the user has not accessed the credential through a credential management application on a mobile device; in response to the request to authenticate the user and based on the credential management system maintaining the credential for the user and determining that the user has not accessed the credential through the credential management application on the mobile device, receiving, by the restricted access system and from the credential management system, (i) challenge data, (ii) instructions to output, on a display of the client device, a representation of the challenge data, (iii) instructions to output, on the display of the client device, a request to install the credential management application on the mobile device, and (iv) instructions to output, on the display of the client device, directions to interact with the representation of the challenge data using the credential management application on the mobile device; transmitting, by the restricted access system and to the client device, (i) the challenge data, (ii) the instructions to output, on the display of the client device, a representation of the challenge data, (iii) the instructions to output, on the display of the client device, the request to install the credential management application on the mobile device, and (iv) the instructions to output, on the display of the client device, the directions to interact with the representation of the challenge data using the credential management application on the mobile device; receiving, by the restricted access system and from the credential management system, a token indicating that the credential management system authenticated the user based on the user interacting, through the credential management application on the mobile device, with the representation of the challenge data that was output on the display of the client device; and in response to receiving the token, opening, by the restricted access system, a session between the client device and the restricted access system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system comprising:
one or more computers and one or more storage devices storing instructions that are operable, when executed by the one or more computers, to cause the one or more computers to perform operations comprising; receiving, by a restricted access system and from a client device, a request for access to the restricted access system for a user; transmitting, by the restricted access system and to a credential management system, a request to authenticate the user, wherein the credential management system maintains a credential for the user and determines that the user has not accessed the credential through a credential management application on a mobile device; in response to the request to authenticate the user and based on the credential management system maintaining the credential for the user and determining that the user has not accessed the credential through the credential management application on the mobile device, receiving, by the restricted access system and from the credential management system, (i) challenge data, (ii) instructions to output, on a display of the client device, a representation of the challenge data, (iii) instructions to output, on the display of the client device, a request to install the credential management application on the mobile device, and (iv) instructions to output, on the display of the client device, directions to interact with the representation of the challenge data using the credential management application on the mobile device; transmitting, by the restricted access system and to the client device, (i) the challenge data, (ii) the instructions to output, on the display of the client device, a representation of the challenge data, (iii) the instructions to output, on the display of the client device, the request to install the credential management application on the mobile device, and (iv) the instructions to output, on the display of the client device, the directions to interact with the representation of the challenge data using the credential management application on the mobile device; receiving, by the restricted access system and from the credential management system, a token indicating that the credential management system authenticated the user based on the user interacting, through the credential management application on the mobile device, with the representation of the challenge data that was output on the display of the client device; and in response to receiving the token, opening, by the restricted access system, a session between the client device and the restricted access system. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
20. A non-transitory computer-readable medium storing software comprising instructions executable by one or more computers which, upon such execution, cause the one or more computers to perform operations comprising:
-
receiving, by a restricted access system and from a client device, a request for access to the restricted access system for a user; transmitting, by the restricted access system and to a credential management system, a request to authenticate the user, wherein the credential management system maintains a credential for the user and determines that the user has not accessed the credential through a credential management application on a mobile device; in response to the request to authenticate the user and based on the credential management system maintaining the credential for the user and determining that the user has not accessed the credential through the credential management application on the mobile device, receiving, by the restricted access system and from the credential management system, (i) challenge data, (ii) instructions to output, on a display of the client device, a representation of the challenge data, (iii) instructions to output, on the display of the client device, a request to install the credential management application on the mobile device, and (iv) instructions to output, on the display of the client device, directions to interact with the representation of the challenge data using the credential management application on the mobile device; transmitting, by the restricted access system and to the client device, (i) the challenge data, (ii) the instructions to output, on the display of the client device, a representation of the challenge data, (iii) the instructions to output, on the display of the client device, the request to install the credential management application on the mobile device, and (iv) the instructions to output, on the display of the client device, the directions to interact with the representation of the challenge data using the credential management application on the mobile device; receiving, by the restricted access system and from the credential management system, a token indicating that the credential management system authenticated the user based on the user interacting, through the credential management application on the mobile device, with the representation of the challenge data that was output on the display of the client device; and in response to receiving the token, opening, by the restricted access system, a session between the client device and the restricted access system.
-
Specification