×

Auto-creation of application passwords

  • US 10,447,692 B2
  • Filed: 03/31/2015
  • Issued: 10/15/2019
  • Est. Priority Date: 03/31/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • detecting, by one or more server computers, an attempt, by an application on a client device, to log in to a user account associated with the application using a first password, the one or more server computers being configured to implement a two-factor authentication process;

    determining, by the one or more server computers, that the first password is stored in account information for the user account as the first factor of the two-factor authentication process;

    obtaining, by the one or more server computers, device information associated with the client device, the device information including a device identifier of the client device and a geographic location of the client device;

    obtaining, by the one or more server computers, historical login information associated with the user account;

    determining, by the one or more server computers from the historical login information and the device information, at least one of a number of times that the client device has previously logged in to the user account from the geographic location or a recency with which the client device has previously logged in to the user account from the geographic location;

    determining, by the one or more server computers, whether the client device is a trusted device based, at least in part, on at least one of the number of times that the client device has previously logged in to the user account from the geographic location or the recency with which the client device has previously logged in to the user account from the geographic location;

    generating and storing, by the one or more server computers, without human intervention, a second password in association with the client device and the user account at least in part in response to determining that the client device is a trusted device andlogging, by the one or more server computers, the application into the user account using the second password as the second factor of the two-factor authentication process.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×