Please download the dossier by clicking on the dossier button x
×

Cloud authentication

  • US 10,348,720 B2
  • Filed: 06/10/2015
  • Issued: 07/09/2019
  • Est. Priority Date: 08/09/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. An authentication system, comprising:

  • a processor configured to;

    receive, at the authentication system, a request for authentication setup for a first user of a first service provider, wherein the authentication system is configured to provide authentication services on behalf of the first service provider; and

    enroll the first user with the authentication system, wherein enrolling the first user with the authentication system includes storing a first set of stimuli to associate with a first user profile of the first user of the first service provider;

    wherein the first set of stimuli to associate with the first user profile of the first user of the first service provider is determined by at least one of the first service provider and the authentication system;

    wherein the authentication system is configured to provide authentication services on behalf of a second service provider, and wherein a second set of stimuli to associate with a second user profile of a second user of the second service provider is determined by at least one of the second service provider and the authentication system;

    receive, at the authentication system and over a network, authentication requests from both the first and second service providers; and

    based at least in part on receiving the authentication requests from both the first and second service providers, provide, from the authentication system and over the network, stimuli based at least in part on the first and second sets of stimuli, wherein the provided stimuli are presented to users of the first and second service providers for classification, wherein stimuli presented to users of the first service provider are selected based at least in part on a first set of policies provided to the authentication system by the first service provider, and wherein stimuli presented to users of the second service provider are selected based at least in part on a second set of policies provided to the authentication system by the second service provider; and

    a memory coupled to the processor and configured to provide the processor with instructions.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×