×

Second factor authorization via a hardware token device

  • US 10,554,641 B2
  • Filed: 02/27/2017
  • Issued: 02/04/2020
  • Est. Priority Date: 02/27/2017
  • Status: Active Grant
First Claim
Patent Images

1. A method for providing second factor authorization using a hardware token device, the method comprising:

  • receiving, by one or more computer processors, a credential from a user device, wherein the credential is an application programming interface key;

    providing, by one or more computer processors, based on a hardware token device generated one-time password and a key identification associated with the hardware token device, a continuous secure access to a website associated with the received credential, wherein providing the continuous secure access to the website comprises;

    linking, by the one or more computer processors, a username associated with the credential to the key identification;

    generating, by the one or more computer processors, a first access token and a first refresh token; and

    allowing, by the one or more computer processors, secure access to the website via the key identification associated with the hardware token device and the first access token and the first refresh token;

    responsive to after the first access token expiring, receiving, by the one or more computer processors, the first access token from the user device;

    sending, by the one or more computer processors, a request to the user device to send the first refresh token;

    receiving, by the one or more computer processors, the first refresh token and a second one-time password, wherein the second one-time password is sent from the hardware token device;

    validating, by the one or more computer processors, the first refresh token;

    determining, by the one or more computer processors, the username associated with the first refresh token;

    retrieving, by the one or more computer processors, the key identification from the linked username and key identification;

    validating, by the one or more computer processors, the second one-time password;

    generating, by the one or more computer processors, a second access token and a second refresh token;

    sending, by the one or more computer processors, the second access token and the second refresh token to the user device; and

    maintaining, by one or more computer processors, the continuous secure access to the website via the key identification associated with the hardware token device, the first one-time password, a set of additional one-time passwords, a set of additional access tokens, and a set of additional refresh tokens.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×