Applications login using a mechanism relating sub-tokens to the quality of a master token
First Claim
1. A system, comprising:
- a non-transitory memory; and
one or more hardware processors coupled with the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising;
in response to receiving authentication information from a user via a user device, causing a first application on the user device to generate a master token based on a determined quality score associated with the authentication information;
detecting a request to access a second application on the user device; and
in response to the detecting the request to access the second application, causing an authentication process of the user for the second application to be performed based on the master token and the determined quality score, without requiring any additional authentication information from the user.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems allow a user to log in to a device so that a number of apps become accessible on the device without the user repeatedly logging in to each different app as the user launches multiple apps. A mechanism of providing a master token with a quality score and providing sub-tokens for each app that can use the sub-token and the score quality to evaluate the level of security provided by the initial login allows each app to skip its own login process and provides a level of enhanced efficiency and convenience for the user. A method includes authenticating a user; creating a master token on the user device; creating a sub-token of the master token for an app launched on the device; the app skipping the login process of the app in response to the sub-token so that the app proceeds directly to validating a transaction.
-
Citations
20 Claims
-
1. A system, comprising:
-
a non-transitory memory; and one or more hardware processors coupled with the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising; in response to receiving authentication information from a user via a user device, causing a first application on the user device to generate a master token based on a determined quality score associated with the authentication information; detecting a request to access a second application on the user device; and in response to the detecting the request to access the second application, causing an authentication process of the user for the second application to be performed based on the master token and the determined quality score, without requiring any additional authentication information from the user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
in response to receiving authentication information from a user via a user device, causing, by one or more hardware processors, a first application on the user device to generate a master token based on a determined quality score associated with the authentication information; detecting, by the one or more hardware processors, a request to access a second application on the user device; and in response to the detecting the request to access the second application, causing, by the one or more hardware processors, an authentication process of the user for the second application to be performed based on the master token and the determined quality score, without requiring any additional authentication information from the user. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory machine-readable medium having stored thereon machine-readable instructions executable to cause a machine to perform operations comprising:
-
in response to receiving authentication information from a user via a user device, causing a first application on the user device to generate a master token based on a determined quality score associated with the authentication information; detecting a request to access a second application on the user device; and in response to the detecting the request to access the second application, causing an authentication process of the user for the second application to be performed based on the master token and the determined quality score, without requiring any additional authentication information from the user. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification