Simplified login for a computing system
First Claim
1. A computing system, comprising:
- a display configured to provide to a user a request to enter a first credential and a second credential during a first login;
a transmitter configured to transmit the first credential and the second credential, which are received via user input, to a validation server during the first login;
a receiver configured to receive encrypted data that is based on the first credential and the second credential; and
one or more processors configured to generate, for a second login that is subsequent to the first login, a login screen requesting the second credential and not the first credential,the transmitter configured to transmit the second credential that is received via the login screen during the second login and the encrypted data from the computing system to the validation server during the second login to enable the validation server to compare the second credential that is received via the login screen during the second login and at least a portion of the encrypted data that is transmitted from the computing system to the validation server during the second login and that is decrypted by the validation server to determine whether to grant the computing system access to a resource.
2 Assignments
0 Petitions
Accused Products
Abstract
Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.
14 Citations
20 Claims
-
1. A computing system, comprising:
-
a display configured to provide to a user a request to enter a first credential and a second credential during a first login; a transmitter configured to transmit the first credential and the second credential, which are received via user input, to a validation server during the first login; a receiver configured to receive encrypted data that is based on the first credential and the second credential; and one or more processors configured to generate, for a second login that is subsequent to the first login, a login screen requesting the second credential and not the first credential, the transmitter configured to transmit the second credential that is received via the login screen during the second login and the encrypted data from the computing system to the validation server during the second login to enable the validation server to compare the second credential that is received via the login screen during the second login and at least a portion of the encrypted data that is transmitted from the computing system to the validation server during the second login and that is decrypted by the validation server to determine whether to grant the computing system access to a resource. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method implemented at least in part by a computing system, the method comprising:
-
providing, by a display of the computing system, a request for a user to enter a first credential and a second credential during a first login; receiving, by a user input interface of the computing system, a user input that includes the first credential and the second credential during the first login; transmitting, by a transmitter of the computing system, the first credential and the second credential to a validation server during the first login; receiving, by a receiver of the computing system, encrypted data based on the first credential and the second credential; generating, by one or more processors of the computing system, a login screen for a second login that is subsequent to the first login, the login screen requesting the second credential and not the first credential; and transmitting, by the transmitter, the second credential that is received via the login screen during the second login and the encrypted data from the computing system to the validation server during the second login to enable the validation server to compare the second credential that is received via the login screen during the second login and at least a portion of the encrypted data that is transmitted from the computing system to the validation server during the second login and that is decrypted by the validation server to determine whether to grant the computing system access to a resource. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computing system comprising:
-
memory; and one or more processors coupled to the memory and configured to; receive a first credential and a second credential from a computing device in accordance with a first logon; encrypt data that is based on the first credential and the second credential to provide encrypted data; send the encrypted data to the computing device for use in subsequent logons; receive user-specified information and the encrypted data from the computing device in accordance with a subsequent logon; decrypt the encrypted data that is received from the computing device in accordance with the subsequent logon to obtain the first credential and the second credential; compare the user-specified information, which is received from the computing device in accordance with the subsequent logon, and the second credential, which is obtained by decrypting the encrypted data that is received from the computing device in accordance with the subsequent logon, to determine whether the user-specified information, which is received from the computing device in accordance with the subsequent logon, and the second credential, which is obtained by decrypting the encrypted data that is received from the computing device in accordance with the subsequent logon, match; and control whether access to a resource is granted to the computing device based at least in part on whether the user-specified information, which is received from the computing device in accordance with the subsequent logon, and the second credential, which is obtained by decrypting the encrypted data that is received from the computing device in accordance with the subsequent logon, match, the user-specified information, which is received from the computing device in accordance with the subsequent logon, matching the second credential, which is obtained by decrypting the encrypted data that is received from the computing device in accordance with the subsequent logon, indicating that the access is to be granted, the user-specified information, which is received from the computing device in accordance with the subsequent logon, not matching the second credential, which is obtained by decrypting the encrypted data that is received from the computing device in accordance with the subsequent logon, indicating that the access is not to be granted. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification