Systems and methods for securing push authentications
First Claim
1. A computer-implemented method for securing push authentications, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- receiving, by a security service and from a security service relying party, a push authentication for a user that the security service relying party encrypted using a public key assigned to a client device of the user, the push authentication including a core message that is encrypted by the security service relying party based on a correct answer to a challenge-response question;
forwarding, by the security service, the push authentication to the client device of the user;
receiving, by the security service, a response to the push authentication from the client device of the user; and
forwarding, by the security service, the response to the push authentication from the client device of the user to the security service relying party.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosed computer-implemented method for securing push authentications may include (i) receiving, by a security service and from a security service relying party, a push authentication for a user that the security service relying party encrypted using a public key assigned to a client device of the user, (ii) forwarding, by the security service, the push authentication to the client device of the user, (iii) receiving, by the security service, a response to the push authentication from the client device of the user, and (iv) forwarding, by the security service, the response to the push authentication from the client device of the user to the security service relying party. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
20 Claims
-
1. A computer-implemented method for securing push authentications, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
receiving, by a security service and from a security service relying party, a push authentication for a user that the security service relying party encrypted using a public key assigned to a client device of the user, the push authentication including a core message that is encrypted by the security service relying party based on a correct answer to a challenge-response question; forwarding, by the security service, the push authentication to the client device of the user; receiving, by the security service, a response to the push authentication from the client device of the user; and forwarding, by the security service, the response to the push authentication from the client device of the user to the security service relying party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for securing push authentications, the system comprising:
-
a reception module, stored in memory, that receives, for a security service and from a security service relying party, a push authentication for a user that the security service relying party encrypted using a public key assigned to a client device of the user, the push authentication including a core message that is encrypted by the security service relying party based on a correct answer to a challenge-response question; a forwarding module, stored in memory, that forwards, for the security service, the push authentication to the client device of the user; wherein; the reception module receives, for the security service, a response to the push authentication from the client device of the user; the forwarding module forwards, for the security service, the response to the push authentication from the client device of the user to the security service relying party; and at least one physical processor configured to execute the reception module and the forwarding module. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory computer-readable medium comprising one or more computer-readable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
receive, by a security service and from a security service relying party, a push authentication for a user that the security service relying party encrypted using a public key assigned to a client device of the user, the push authentication including a core message that is encrypted by the security service relying party based on a correct answer to a challenge-response question; forward, by the security service, the push authentication to the client device of the user; receive, by the security service, a response to the push authentication from the client device of the user; and forward, by the security service, the response to the push authentication from the client device of the user to the security service relying party.
-
Specification