Systems and methods for challengeless coauthentication
First Claim
Patent Images
1. A method of authentication, the method comprising:
- receiving, at an authenticator, an authentication request to access a resource, wherein the authentication request is generated by a requestor;
receiving, at a collaborator, a verification request to access the resource,wherein the verification request is generated by the requestor and received from the requestor;
generating, at the collaborator, a participation message, wherein the participation message is generated in response to the verification request to access the resource received from the requestor and wherein the participation message is not generated in response to a challenge generated by the authenticator;
receiving, at the authenticator, the participation message generated by the collaborator in response to the verification request to access the resource generated by the requestor;
analyzing, at the authenticator computing device, the authentication request to access a resource and the participation message to determine whether the requestor should be granted access to the resource; and
granting the requesting user access to the resource when it is determined that the requesting user should be granted access to the resource based upon the analysis of the authentication request to access a resource and the participation message.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method of authentication that avoids authentication challenges is described. In operation, an authenticator receives a first request to access a resource generated by a requestor and a participation message generated by a collaborator. The authenticator computing device then analyzes the first request and the participation message to determine whether the requestor requesting access to the resource should be granted access and grants the requestor access to the resource based upon the analysis of the first request to access a resource and the participation message.
-
Citations
22 Claims
-
1. A method of authentication, the method comprising:
-
receiving, at an authenticator, an authentication request to access a resource, wherein the authentication request is generated by a requestor; receiving, at a collaborator, a verification request to access the resource, wherein the verification request is generated by the requestor and received from the requestor; generating, at the collaborator, a participation message, wherein the participation message is generated in response to the verification request to access the resource received from the requestor and wherein the participation message is not generated in response to a challenge generated by the authenticator; receiving, at the authenticator, the participation message generated by the collaborator in response to the verification request to access the resource generated by the requestor; analyzing, at the authenticator computing device, the authentication request to access a resource and the participation message to determine whether the requestor should be granted access to the resource; and granting the requesting user access to the resource when it is determined that the requesting user should be granted access to the resource based upon the analysis of the authentication request to access a resource and the participation message. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. One or more non-transitory computer-readable media having computer-executable instructions for performing a method of running a software program on a computing device, the method including issuing instructions from the software program, the instructions comprising:
-
receiving, at an authenticator, a authentication request to access a resource generated by a requestor; receiving, at a collaborator, a verification request to access a resource from the requestor; generating, at a collaborator, a participation message, wherein the participation message is generated in response to the verification request to access the resource received from the requestor and wherein the participation message is not generated in response to a challenge generated by the authenticator receiving, at the authenticator, the participation message generated by the collaborator in response to the verification request to access a resource generated by the requestor; analyzing, at the authenticator computing device, the authentication request to access a resource and the participation message to determine whether the requestor should be granted access to the resource; and granting the requesting user access to the resource when it is determined that the requesting user should be granted access to the resource based upon the analysis of the authentication request to access a resource and the participation message. - View Dependent Claims (11, 12, 13)
-
-
14. An authentication system comprising:
an authenticator computing device configured to; receive a authentication request to access a resource, wherein the authentication request is generated by a requestor; receiving a participation message generated by a collaborator in response to a verification request to access a resource, wherein the verification request is generated by the requestor and received from the requestor and wherein the participation message is not generated in response to a challenge generated by the authenticator; analyzing, at the authenticator computing device, the authentication request to access a resource and the participation message to determine whether the requestor should be granted access to the resource; and grant the requesting user access to the resource when it is determined that the requesting user should be granted access to the resource based upon the analysis of the authentication request to access a resource and the participation message. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
Specification