SYSTEM AND METHOD FOR ENFORCING A POLICY FOR AN AUTHENTICATOR DEVICE
First Claim
Patent Images
1. A method comprising:
- within a policy engine, defining at least one authenticator device authentication policy through an administration interface;
collecting a device status assessment from an authenticator device;
evaluating policy compliance of the device status assessment to an associated device authentication policy of the policy engine; and
enforcing use of the authenticator device according to the policy compliance comprising;
if the policy compliance indicates the authenticator device status assessment is in compliance with the authenticator device authentication policy, allowing the authenticator device to be used in an authentication process; and
if the policy compliance indicates the authenticator device status assessment is not in compliance with the authenticator device authentication policy, preventing the authenticator device to be used in the authentication process.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method including defining at least one device authentication policy; at a policy engine, initializing authentication policy processing for an authenticator device; collecting device status assessment; evaluating policy compliance of the device status assessment to an associated defined device authentication policy; and enforcing use of the authenticator device according to the policy compliance.
-
Citations
19 Claims
-
1. A method comprising:
-
within a policy engine, defining at least one authenticator device authentication policy through an administration interface; collecting a device status assessment from an authenticator device; evaluating policy compliance of the device status assessment to an associated device authentication policy of the policy engine; and enforcing use of the authenticator device according to the policy compliance comprising; if the policy compliance indicates the authenticator device status assessment is in compliance with the authenticator device authentication policy, allowing the authenticator device to be used in an authentication process; and if the policy compliance indicates the authenticator device status assessment is not in compliance with the authenticator device authentication policy, preventing the authenticator device to be used in the authentication process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
defining at least one authenticator device authentication policy through an administration interface; collecting a device status assessment from an authenticator device; evaluating policy compliance of the device status assessment to an associated device authentication policy; and receiving an authentication push notification at an authentication application on the authenticator device; enforcing use of the authenticator device according to the policy compliance comprising; if the policy compliance indicates the authenticator device status assessment is in compliance with the authenticator device authentication policy, allowing the authenticator application to be used in authenticating a login attempt associated with the authentication push notification; and if the policy compliance indicates the authenticator device status assessment is not in compliance with the authenticator device authentication policy, preventing the authenticator application in authenticating the login attempt associated with the authentication push notification. - View Dependent Claims (15)
-
-
16. A method comprising:
-
defining at least one authenticator device authentication policy through an administration interface; collecting a device status assessment from an authenticator device; establishing a passcode secondary factor authentication request in a passcode authentication application on the authenticator device; evaluating policy compliance of the device status assessment to an associated device authentication policy; and enforcing use of the authenticator device according to the policy compliance comprising; if the policy compliance indicates the authenticator device status assessment is in compliance with the authenticator device authentication policy, allowing the authenticator device to be used in authenticating a passcode secondary-factor authentication request; and if the policy compliance indicates the authenticator device status assessment is not in compliance with the authenticator device authentication policy, preventing the authenticator device from authenticating the passcode secondary factor authentication request. - View Dependent Claims (17, 18, 19)
-
Specification