×

Two factor authentication with authentication objects

  • US 10,356,069 B2
  • Filed: 02/11/2016
  • Issued: 07/16/2019
  • Est. Priority Date: 06/26/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • obtaining, from a first device, a request to authenticate an identity;

    providing, on a second device, a graphical user interface that makes an authentication object available for selection, the graphical user interface including graphical representations of sets of actions for authenticating by corresponding service provider systems, including a graphical representation that represents a set of actions for authenticating the identity by a service provider system, wherein the authentication object encodes;

    a set of credentials usable to authenticate the identity; and

    an access policy that specifies a permitted use or a restriction on use of the authentication object; and

    is associated with a set of actions for authenticating the identity;

    receiving, from the second device, user input indicating selection of the authentication object; and

    performing the set of actions by at least;

    obtaining an authentication claim generated based at least in part on the request from the first device and the set of credentials encoded in the authentication object selected from the second device; and

    causing, at least in part by providing the authentication claim to a computing resource service provider system, the authentication claim to be used to authenticate the identity.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×