SYSTEM AND METHODS FOR AUTHENTICATION USING MULTIPLE DEVICES
First Claim
1. A method of authentication using at least two user devices, the method comprising:
- registering each user device of a plurality of user devices with an authenticator computing device, wherein each of the plurality of user devices are registered to at least one user;
receiving, at the authenticator computing device, a request to access a resource from one user device of the plurality of user devices registered with the authenticator computing device;
generating an authentication challenge at the authenticator computing device in response to the request;
transmitting the authentication challenge to a subset of user devices of the plurality of user devices registered with the authenticator computing device, wherein the subset of user devices comprises at least one device other than the one user device requesting access to the resource and wherein the one user device requesting access to the resource has not been authenticated by the authenticator computing device;
generating at least one response to the authentication challenge at one or more user devices of the subset of user devices;
transmitting the at least one response to the authenticator computing device;
determining, at the authenticator computing device, if the at least one response constitutes a valid response to the authentication challenge; and
granting at least one user device of the plurality of user devices registered with the authenticator computing device access to the resource if the at least one response received at the authenticator computing device constitutes a valid response to the authentication challenge.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method of authentication using an authenticator computing device and at least two registered user devices is described. In operation, the authenticator computing device receives a request to access a resource from one of a plurality of user devices registered to a user. The authenticator computing device generates an authentication challenge in response to the request and the authentication challenge is then transmitted to a subset of the plurality of user devices. One or more of the user devices then subsequently generates and transmits a response to the authentication challenge to the authenticator computing device. The authenticator computing device then determines whether the responses received from the one or more user devices in the subset constitutes a valid response and then grants one or more of the user devices access to the resource if the responses received from the user devices constitutes a valid response to the authentication challenge.
61 Citations
29 Claims
-
1. A method of authentication using at least two user devices, the method comprising:
-
registering each user device of a plurality of user devices with an authenticator computing device, wherein each of the plurality of user devices are registered to at least one user; receiving, at the authenticator computing device, a request to access a resource from one user device of the plurality of user devices registered with the authenticator computing device; generating an authentication challenge at the authenticator computing device in response to the request; transmitting the authentication challenge to a subset of user devices of the plurality of user devices registered with the authenticator computing device, wherein the subset of user devices comprises at least one device other than the one user device requesting access to the resource and wherein the one user device requesting access to the resource has not been authenticated by the authenticator computing device; generating at least one response to the authentication challenge at one or more user devices of the subset of user devices; transmitting the at least one response to the authenticator computing device; determining, at the authenticator computing device, if the at least one response constitutes a valid response to the authentication challenge; and granting at least one user device of the plurality of user devices registered with the authenticator computing device access to the resource if the at least one response received at the authenticator computing device constitutes a valid response to the authentication challenge. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. One or more non-transitory computer-readable media having computer-executable instructions for performing a method of running a software program on a computing device, the method including issuing instructions from the software program, the instructions comprising:
-
registering each user device of a plurality of user devices with an authenticator computing device, wherein each of the plurality of user devices are registered to at least one user; receiving, at an authenticator computing device, a request to access a resource from one user device of a plurality of user devices registered with the authenticator computing device; generating an authentication challenge at the authenticator computing device in response to the request; transmitting the authentication challenge to a subset of user devices of the plurality of user devices registered with the authenticator computing device, wherein the subset of user devices comprises at least one device other than the one user device requesting access to the resource and wherein the one user device requesting access to the resource has not been authenticated by the authenticator computing device; generating at least one response to the authentication challenge at one or more user devices of the subset of user devices; transmitting the at least one response to the authenticator computing device; determining, at the authenticator computing device, if the at least one response constitutes a valid response to the authentication challenge; and granting at least one user device of the plurality of user devices registered with the authenticator computing device access to the resource if the at least one response received at the authenticator computing device constitutes a valid response to e authentication challenge. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. An authentication system comprising:
an authenticator computing device configured to register each user device of a plurality of user devices with the authenticator computing device, wherein each of the plurality of user devices is registered to at least one user, the authenticator computing device further configured to receive a request to access a resource from one user device of a plurality of user devices registered with the authenticator computing device, the authenticator computing device further configured to generate an authentication challenge in response to the request, to transmit the authentication challenge to a subset of user devices of the plurality of user devices registered with the authenticator computing device, wherein the subset of user devices comprises at least one device other than the one user device requesting access to the resource and wherein the one user device requesting access to the resource has not been authenticated by the authenticator computing device, or, the authenticator computing device configured to transmit the authentication challenge to the user device requesting access to a resource for subsequent transmission of the authentication challenge from the user device requesting access to a resource to the other user device(s) of the subset, the authenticator computing device further configured to receive at least one response to the authentication challenge from one or more user devices of the subset of user devices, the authenticator computing device further configured to determine if the at least one response constitutes a valid response to the authentication challenge and to grant at least one user device of the plurality of user devices registered with the authenticator computing device access to the resource if the at least one response received constitutes a valid response to the authentication challenge. - View Dependent Claims (28, 29)
Specification