System and method of authentication
First Claim
1. An authentication method, comprising:
- prompting a user of a computing device to transmit a first authentication token associated with an Internet account;
prompting the user to transmit a second authentication token associated with the Internet account;
receiving the second authentication token via the computing device; and
transmitting a temporary authentication token to a set-top box device of the user.
2 Assignments
0 Petitions
Accused Products
Abstract
The above-disclosed subject matter is to be considered illustrative, and not restrictive, and the A system and method of resetting authentication tokens is disclosed. In a particular embodiment, the method includes prompting a user of a computing device to transmit a first authentication token associated with an Internet account. The method also includes prompting the user to transmit a second authentication token associated with the Internet account. Further, the method includes receiving the second authentication token via the computing device and transmitting a temporary authentication token to a set-top box device of the user.
182 Citations
33 Claims
-
1. An authentication method, comprising:
-
prompting a user of a computing device to transmit a first authentication token associated with an Internet account;
prompting the user to transmit a second authentication token associated with the Internet account;
receiving the second authentication token via the computing device; and
transmitting a temporary authentication token to a set-top box device of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
- 8. An authentication method, comprising receiving a temporary authentication token at a set-top box device, wherein the temporary authentication token is associated with an Internet account of a user.
-
10. The authentication method of claim 10, further comprising prompting the user for a set-top box authentication token and receiving the set-top box authentication token before transmitting the temporary authentication token to the display device.
-
11. An authentication method, comprising:
-
prompting a user to input a first set-top box authentication token;
prompting the user to input a second set-top box authentication token;
receiving the second set-top box authentication token; and
transmitting a command to a server to provide a temporary set-top box authentication token via a second device that is not a set-top box device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. An authentication method, comprising:
-
receiving a command from a set-top box device to associate a temporary set-top box authentication token with an Internet account; and
associating the temporary set-top box authentication token with the Internet account. - View Dependent Claims (20)
-
-
21. An authentication method, comprising:
-
receiving a command from a set-top box device to associate a temporary set-top box authentication token with an identifier of a telephone device; and
associating the temporary set-top box authentication token with the identifier of a telephone device. - View Dependent Claims (22)
-
-
23. An authentication system, comprising:
-
a server having a processor and a memory device accessible to the processor; and
wherein the memory device includes an authentication module that is executable by the processor to;
prompt for a first authentication token associated with an Internet account;
prompt for a second authentication token associated with the Internet account; and
wherein the server provides a temporary authentication token to a set-top box device after the second authentication token is received. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30)
-
-
31. A set-top box device, comprising:
-
a processor and a memory device accessible to the processor; and
wherein the memory device includes instructions to receive a temporary authentication token associated with an Internet account of a user. - View Dependent Claims (32)
-
-
33. A computer program embedded in a computer-readable medium, the computer program comprising:
-
instructions to prompt a user of a computing device to transmit a first authentication token associated with an Internet account;
instructions to prompt the user to transmit a second authentication token; and
instructions to issue a command to transmit a temporary authentication token, for use at the computing device, to a set-top box device after the second authentication token is transmitted.
-
Specification