MOBILE BASED LOGIN VIA WIRELESS CREDENTIAL TRANSFER
First Claim
1. A method comprising:
- receiving, at a proxy server, a registration request for a receiver device for accessing a secure resource;
registering, at the proxy server, the receiver device in response to the registration request;
receiving, at the proxy server and from a transmitter device different from the receiver device, information identifying the transmitter device along with authentication credentials for authenticating the receiver device to access the secure resource, wherein the transmitter device and the receiver device are end-user computing devices;
identifying, at the proxy server, the receiver device based on the information identifying the transmitter device; and
forwarding, from the proxy server to the receiver device, the authentication credentials for authenticating access of the receiver device to the secure resource.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for mobile-based login via wireless credential transfer are disclosed. In some implementations, a proxy server receives a registration request for a receiver device for accessing a secure resource. The proxy server registers the receiver device in response to the registration request. The proxy server receives, from a transmitter device, information identifying the transmitter device along with authentication credentials for authenticating the receiver device to access the secure resource. The proxy server identifies the receiver device based on the information identifying the transmitter device. The proxy server forwards, to the receiver device, the authentication credentials for authenticating access of the receiver device to the secure resource.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, at a proxy server, a registration request for a receiver device for accessing a secure resource; registering, at the proxy server, the receiver device in response to the registration request; receiving, at the proxy server and from a transmitter device different from the receiver device, information identifying the transmitter device along with authentication credentials for authenticating the receiver device to access the secure resource, wherein the transmitter device and the receiver device are end-user computing devices; identifying, at the proxy server, the receiver device based on the information identifying the transmitter device; and forwarding, from the proxy server to the receiver device, the authentication credentials for authenticating access of the receiver device to the secure resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium comprising instructions which, when executed by a proxy server, cause the proxy server to:
-
receive, at the proxy server, a registration request for a receiver device for accessing a secure resource; register, at the proxy server, the receiver device in response to the registration request; receive, at the proxy server and from a transmitter device different from the receiver device, information identifying the transmitter device along with authentication credentials for authenticating the receiver device to access the secure resource, wherein the transmitter device and the receiver device are end-user computing devices; identify, at the proxy server, the receiver device based on the information identifying the transmitter device; and forward, from the proxy server to the receiver device, the authentication credentials for authenticating access of the receiver device to the secure resource. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A system comprising:
-
one or more processors; and a memory comprising instructions which, when executed by the one or more processors, cause the one or more processors to; receive, at a proxy server, a registration request for a receiver device for accessing a secure resource; register, at the proxy server, the receiver device in response to the registration request; receive, at the proxy server and from a transmitter device different from the receiver device, information identifying the transmitter device along with authentication credentials for authenticating the receiver device to access the secure resource, wherein the transmitter device and the receiver device are end-user computing devices; identify, at the proxy server, the receiver device based on the information identifying the transmitter device; and forward, from the proxy server to the receiver device, the authentication credentials for authenticating access of the receiver device to the secure resource.
-
Specification