TECHNIQUES FOR AUTHENTICATION VIA A MOBILE DEVICE
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for authentication via a mobile device are provided. A mobile device is pre-registered for website authentication services. A user encounters a website displaying an embedded code as an image alongside a normal login process for that website. The image is identified by the mobile device, encrypted and signed by the mobile device and sent to a proxy. The proxy authenticates the code and associates it with the website. Credentials for the user are provided to the website to automatically authenticate the user for access to the website bypassing the normal login process associated with the website.
-
Citations
21 Claims
-
1. (canceled)
-
2. A method, comprising:
-
acquiring, by a mobile device, an encrypted code for a website; decrypting, by the mobile device, the encrypted code to produce a number; encrypting and signing, by the mobile device, the number; and sending, by the mobile device, the encrypted and signed number to a proxy of a resource accessible through the website and performing, by the proxy, authentication of the mobile device to the resource for access through the website. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
obtaining, by an authenticator mobile application executing on a mobile device, a code; producing, by the authenticator mobile application, a second code from the code; and providing, by the authenticator mobile application, the second code to authenticate a user operating the mobile device to a remote network resource. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system, comprising:
-
a processor configured with a proxy service that resides and is implemented within a non-transitory computer-readable storage medium and that executes on the processor; and the proxy service is configured to act as a frontend interface to a resource that requires authenticated access, the proxy service also configured to authenticate a user, via a mobile device, through an encrypted and signed code processed by a mobile application of the mobile device from one of;
a barcode and Quick Response (QR) code, the barcode or QR code injected into a website for logging into the resource by the proxy service, the proxy service further configured to process the processed encrypted and signed code to acquire credentials for the user and to provide the credentials to the resource to establish an authenticated session between the user and the resource. - View Dependent Claims (21)
-
Specification