Efficient logon
First Claim
Patent Images
1. A method comprising:
- detecting a first device associated with a user within a detectable range of a second device;
requesting authentication information based on an authentication challenge indicated in a user profile associated with the first device;
receiving the authentication information;
in response to receiving the authentication information, installing a token generator associated with the user on the second device;
generating, by the token generator associated with the user, a secure token;
sending, to a server, the secure token and a time stamp associated with the secure token;
granting, to the user, access to one or more services in response to receiving a verification of the secure token; and
in response to the user logging off the second device, removing the token generator.
1 Assignment
0 Petitions
Accused Products
Abstract
The technology described herein detects a first device associated with a user that is within a detectable range of a second device. The system requests authentication information. In response to receiving the authentication information, a token generator associated with the user can generate a secure token. The secure token can be sent to the server. Once the secure token is verified, the user is granted access to one or more services.
-
Citations
19 Claims
-
1. A method comprising:
-
detecting a first device associated with a user within a detectable range of a second device; requesting authentication information based on an authentication challenge indicated in a user profile associated with the first device; receiving the authentication information; in response to receiving the authentication information, installing a token generator associated with the user on the second device; generating, by the token generator associated with the user, a secure token; sending, to a server, the secure token and a time stamp associated with the secure token; granting, to the user, access to one or more services in response to receiving a verification of the secure token; and in response to the user logging off the second device, removing the token generator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium containing a set of instructions that, when executed by one or more processors, cause a machine to:
-
detect a first device associated with a user within a detectable range of a second device; request authentication information based on an authentication challenge indicated in a user profile associated with the first device; receive the authentication information; in response to receiving the authentication information, install a token generator associated with the user on the second device; generate, by the token generator associated with the user, a secure token; send, to a server, the secure token and a time stamp associated with the secure token; grant, to the user, access to one or more services in response to receiving a verification of the secure token; and in response to the user logging off the second device, remove the token generator. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a memory; a processor in communication with the memory, the processor operable to execute software modules, the software modules comprising; a detection module configured to; detect a first device associated with a user within a detectable range of a second device; an authentication request module configured to; request authentication information based on an authentication challenge indicated in a user profile associated with the first device, receive the authentication information, in response to receiving the authentication information, install a token generator associated with the user on the second device, generate, by a token generator associated with the user, a secure token, send, to a server, the secure token and a time stamp associated with the secure token, in response to the user logging off of the second device, remove the token generator; and a logon module configured to; grant, to the user, access to one or more services in response to receiving a verification of the secure token. - View Dependent Claims (18, 19)
-
Specification