Methods and devices for secure authentication to a compute device
First Claim
1. An apparatus, comprising:
- a memory of a mobile compute device; and
a hardware processor of the mobile compute device, the hardware processor configured to implement an operating system and a native authentication application that is not part of the operating system,the operating system configured to receive a first authentication identifier, the operating system configured to authorize use of the mobile compute device based on the first authentication identifier meeting a first criterion,the native authentication application configured to receive, in response to the first authentication identifier meeting the first criterion, an indication from the operating system that the operating system has authorized use of the mobile compute device,the native authentication application configured to, in response to receiving the indication, disable at least one function of the mobile compute device and transmit a request for at least a portion of a second authentication identifier to an authentication entity associated with a user and powered by the mobile compute device,the native authentication application configured to receive the at least the portion of the second authentication identifier from the authentication entity, the at least the portion of the second authentication identifier comprising a cryptographic signature, the native authentication application configured to enable the at least one function in response to the second authentication identifier meeting a second criterion.
5 Assignments
0 Petitions
Accused Products
Abstract
An apparatus includes a memory of a mobile compute device, and a hardware processor of the mobile compute device. The hardware processor is configured to implement an operating system and an authentication module. The operating system is configured to receive a first authentication identifier, and is also configured to authorize use of the mobile compute device based on the first authentication identifier meeting a first criterion. The authentication module is configured to, in response to the operating system authorizing use of the mobile compute device, disable at least one function of the mobile compute device and request a second authentication identifier. The authentication module is also configured to receive the second authentication identifier. The authentication module is also configured to enable the at least one function in response to the second authentication identifier meeting a second criterion.
-
Citations
18 Claims
-
1. An apparatus, comprising:
-
a memory of a mobile compute device; and a hardware processor of the mobile compute device, the hardware processor configured to implement an operating system and a native authentication application that is not part of the operating system, the operating system configured to receive a first authentication identifier, the operating system configured to authorize use of the mobile compute device based on the first authentication identifier meeting a first criterion, the native authentication application configured to receive, in response to the first authentication identifier meeting the first criterion, an indication from the operating system that the operating system has authorized use of the mobile compute device, the native authentication application configured to, in response to receiving the indication, disable at least one function of the mobile compute device and transmit a request for at least a portion of a second authentication identifier to an authentication entity associated with a user and powered by the mobile compute device, the native authentication application configured to receive the at least the portion of the second authentication identifier from the authentication entity, the at least the portion of the second authentication identifier comprising a cryptographic signature, the native authentication application configured to enable the at least one function in response to the second authentication identifier meeting a second criterion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
receive, using a native application that is not part of an operating system on a mobile compute device, an indication that the operating system has authorized use of the mobile compute device; disable, at a first time using the native application and in response to receiving the indication, at least one function of the mobile compute device in response to the operating system of the mobile compute device authorizing use of the mobile compute device; request at least a portion of an authentication identifier from a Near Field Communication (NFC) device associated with a user and powered by the mobile compute device; receive, from the NFC device via an NFC communication channel and at a second time after the first time, the at least the portion of the authentication identifier; and enable the at least one function of the mobile compute device when the authentication identifier meets a predetermined criterion. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification