Apparatus and method of tiered authentication
First Claim
1. A method of authenticating a user comprising:
- providing a plurality of authentication schemes for authenticating a user on a device, each of the plurality of authentication schemes having a varying level of security associated therewith;
providing a plurality of services to the user through use of the device, each of the plurality of services having a level of information sensitivity associated therewith;
associating each of the plurality of services with one or more of the plurality of authentication schemes; and
providing access to the user of the service associated once a user has properly been authenticated using the corresponding authentication scheme.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method of authenticating a user is thereby disclosed, comprising providing a plurality of authentication schemes for authenticating a user on a device, each of the plurality of authentication schemes having a varying level of security associated therewith, providing access to a plurality of services to the user through use of the device, each of the plurality of services having a level of information sensitivity associated therewith, associating each of the plurality of services with one of the plurality of authentication schemes, and permitting access of the user to the service associated once a user has properly been authenticated using the corresponding authentication scheme.
73 Citations
20 Claims
-
1. A method of authenticating a user comprising:
-
providing a plurality of authentication schemes for authenticating a user on a device, each of the plurality of authentication schemes having a varying level of security associated therewith;
providing a plurality of services to the user through use of the device, each of the plurality of services having a level of information sensitivity associated therewith;
associating each of the plurality of services with one or more of the plurality of authentication schemes; and
providing access to the user of the service associated once a user has properly been authenticated using the corresponding authentication scheme. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9, 10, 11, 12, 13)
-
-
8. A method of tiered authentication comprising:
-
providing a plurality of services which are accessible by a user on a device, each of the plurality of services having a varying permission level;
providing a plurality of authentication schemes through which the user may be authenticated and providing access to at least one of the plurality of services;
categorizing each of the plurality of services with at least one authentication scheme, the level of security of the authentication scheme corresponding to the permission level of the service.
-
-
14. A method of tiered authentication comprising:
-
providing a plurality of services which are accessible by a user on a device, the plurality of services being further divided into at least two tiers of services, the at least two tiers of services differing in terms of sensitivity of information;
providing a first level of authentication, the first level of authentication utilizing a first method of authentication to provide access to a user of a first tier of services on the device; and
providing a second level of authentication, the second level of authentication utilizing a second method of authentication, the second method of authentication being distinct from the first method of authentication, the second level of authentication used to provide access to a user of a second tier of services. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification