IMAGE-BASED KEY EXCHANGE
First Claim
1. A method of configuring a computing device to provide a secondary authentication password for a password-protected web service, the method comprising:
- capturing, using an image capture device communicatively coupled to a first computing device, an encoded graphical image presented by a display of a second computing device, wherein the encoded graphical image indicates a representation of a secure authentication key;
determining, from the captured encoded graphical image, the secure authentication key; and
storing the secure authentication key on the first computing device for subsequent use to generate a password to acquire access to a password-protected web service.
2 Assignments
0 Petitions
Accused Products
Abstract
This disclosure is directed for improved techniques for configuring a device to generate a secondary password based at least in part on a secure authentication key. The techniques of this disclosure may, in some examples, provide for capturing, by a computing device, an image of a display of another computing device. The captured image includes at least one encoded graphical image, such as a barcode, that includes an indication of the content of a secure authentication key. The computing device may use the secure authentication key to generate a secondary password to be used in conjunction with a primary password to gain access to a password-protected web service.
41 Citations
21 Claims
-
1. A method of configuring a computing device to provide a secondary authentication password for a password-protected web service, the method comprising:
-
capturing, using an image capture device communicatively coupled to a first computing device, an encoded graphical image presented by a display of a second computing device, wherein the encoded graphical image indicates a representation of a secure authentication key; determining, from the captured encoded graphical image, the secure authentication key; and storing the secure authentication key on the first computing device for subsequent use to generate a password to acquire access to a password-protected web service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computing device, comprising:
-
at least one processor; a camera module configured to operate an image capture device communicatively coupled to the computing device to capture at least one image of a display of another computing device, wherein the at least one captured image includes at least one encoded graphical image; means for processing the captured image to determine content of a secure authentication key represented by the encoded graphical image; and a storage module to store the secure authentication key on the computing device for subsequent use to generate a password to acquire access to a password-protected web service. - View Dependent Claims (15)
-
-
16. An article of manufacture comprising a computer-readable medium that stores instructions configured to cause a computing device to configure a mobile device to provide an authentication password for a password-protected web service, wherein the instructions cause the computing device to:
-
capture, using an image capture device communicatively coupled to a first computing device, an encoded graphical image presented by a display of a second computing device, wherein the encoded graphical image indicates a representation of a secure authentication key; determine, from the detected encoded graphical image, the secure authentication key; store the secure authentication key on the first computing device; and use the stored secure authentication key to generate a secondary password to be used in conjunction with a primary password to acquire access to a password-protected web service.
-
-
17. A method for providing a secondary password authentication for a password-protected web service, the method comprising:
-
receiving, from a user, a request for a secure authentication key; generating an encoded graphical image that includes at least one indication of the secure authentication key; and transmitting, for display by a first computing device, a graphical image that indicates a representation of a secure authentication key, wherein the secure authentication key is configured to be stored on a second computing device and subsequently used by the second computing device to generate a password to be used to gain access to a password-protected web service. - View Dependent Claims (18, 19, 20, 21)
-
Specification