PASSWORD-LESS AUTHENTICATION SERVICE
First Claim
1. An authentication device, comprising:
- one or more processors to;
receive a user identifier and a device identifier associated with a user;
verify the user using the device identifier;
cause a first device, identified by the device identifier, to generate or obtain a digital certificate based on verifying the user;
receive an authentication request generated based on a request to access a service via a second device that is different from the first device,the authentication request including the user identifier;
identify the first device using the user identifier included in the authentication request;
authenticate the first device, using the digital certificate, based on identifying the first device;
generate an access notification based on authenticating the first device,the access notification including information relating to the request to access the service;
provide the access notification to the first device;
receive an access response from the first device,the access response indicating whether to allow or deny access to the service via the second device;
selectively perform a first action or a second action based on the access response,the first action including providing a first instruction to allow access to the service via the second device when the access response indicates to allow access to the service,the second action including providing a second instruction to deny access to the service via the second device when the access response indicates to deny access to the service.
1 Assignment
0 Petitions
Accused Products
Abstract
A device may receive an authentication request generated based on a request to access a service. The authentication request may include a user identifier. The device may identify a mobile device associated with the user identifier. The device may authenticate the mobile device, and may generate an access notification based on authenticating the mobile device. The access notification may include information relating to the request to access the service. The device may provide the access notification to the mobile device, and may receive an access response from the mobile device. The access response may indicate whether to permit access to the service. The device may cause access to the service to be permitted when the access response indicates to permit access to the service, or may cause access to the service to be denied when the access response indicates to deny access to the service.
-
Citations
20 Claims
-
1. An authentication device, comprising:
one or more processors to; receive a user identifier and a device identifier associated with a user; verify the user using the device identifier; cause a first device, identified by the device identifier, to generate or obtain a digital certificate based on verifying the user; receive an authentication request generated based on a request to access a service via a second device that is different from the first device, the authentication request including the user identifier; identify the first device using the user identifier included in the authentication request; authenticate the first device, using the digital certificate, based on identifying the first device; generate an access notification based on authenticating the first device, the access notification including information relating to the request to access the service; provide the access notification to the first device; receive an access response from the first device, the access response indicating whether to allow or deny access to the service via the second device; selectively perform a first action or a second action based on the access response, the first action including providing a first instruction to allow access to the service via the second device when the access response indicates to allow access to the service, the second action including providing a second instruction to deny access to the service via the second device when the access response indicates to deny access to the service. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors, cause the one or more processors to; receive, from a third party device, an authentication request generated based on a request, by a client device, to access a service provided by the third party device, the authentication request including a user identifier; identify a mobile device associated with the user identifier; authenticate the mobile device, using a digital certificate, based on identifying the mobile device; generate an access notification based on authenticating the mobile device, the access notification including information relating to the request to access the service; provide the access notification to the mobile device to cause the access notification to be provided for display via the mobile device; receive an access response from the mobile device based on an interaction with the access notification, the access response indicating whether to permit the client device to access the service provided via the third party device; and selectively perform a first action or a second action based on the access response, the first action including providing a first instruction, to the third party device, to permit access to the service via the client device when the access response indicates to permit access to the service, the second action including providing a second instruction, to the third party device, to deny access to the service via the client device when the access response indicates to deny access to the service. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A method, comprising:
-
receiving, by an authentication device, an authentication request generated based on a request to access a service, the authentication request including a user identifier; identifying, by the authentication device, a mobile device associated with the user identifier; authenticating, by the authentication device, the mobile device; generating, by the authentication device, an access notification based on authenticating the mobile device, the access notification including information relating to the request to access the service; providing, by the authentication device, the access notification to the mobile device; receiving an access response from the mobile device based on providing the access notification to the mobile device, the access response indicating whether to permit access to the service; and
selectively performing a first action or a second action based on the access response,the first action including causing access to the service to be permitted when the access response indicates to permit access to the service, the second action including causing access to the service to be denied when the access response indicates to deny access to the service. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification