METHODS AND SYSTEMS FOR USING DERIVED CREDENTIALS TO AUTHENTICATE A DEVICE ACROSS MULTIPLE PLATFORMS
First Claim
Patent Images
1. A method for authenticating a login request received by a provider server comprising:
- (a) receiving from the provider server an identity assertion request associated with the login request;
(b) receiving an identity identifier for an identity associated with the identity assertion request;
(c) in response to receiving the identity assertion request and the identity identifier, identifying a client device associated with the identity identifier and the provider server; and
(d) sending a validation request to the client device.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for adapting existing service provider servers to support two-factor authentication by leveraging an authentication server, which may be operated by a third party. Where a user desires to access content or services offered by a service provider server, the user may employ a client agent (for example, a web browser) in order to authenticate with the service provider server. Service provider server can redirect client agent to an authentication server to process at least a second factor or derived credential.
-
Citations
40 Claims
-
1. A method for authenticating a login request received by a provider server comprising:
-
(a) receiving from the provider server an identity assertion request associated with the login request; (b) receiving an identity identifier for an identity associated with the identity assertion request; (c) in response to receiving the identity assertion request and the identity identifier, identifying a client device associated with the identity identifier and the provider server; and (d) sending a validation request to the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computing device for authenticating a login request received by a provider server, the computing device comprising:
-
a memory; and a processor communicatively coupled to the memory, the processor configured to; receive from a provider server an identity assertion request associated with the login request; receive an identity identifier for an identity associated with the identity assertion request; in response to receiving the assertion request and the identity identifier, identify a client device associated with the identity identifier and the provider server; and send a validation request to the client device. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification