METHOD FOR AUTHENTICATING A DEVICE
First Claim
1. A method for authenticating a first device, the method being executed by a second device, the second device comprising a database, the database storing a profile associated to a user of the first device, the second device using the profile of the user to generate a first challenge comprising a question and a corresponding response for authentication of the first device, the method comprising, upon successful authentication of the first device using the first challenge, the steps of:
- collecting contextual information from the first device,updating the profile associated to the user of the first device with the received contextual information for a subsequent generation of a second challenge for authentication of the first device.
1 Assignment
0 Petitions
Accused Products
Abstract
Present system relates to a method for authenticating a first device, the method being executed by a second device, the second device comprising a database, the database storing a profile associated to a user of the first device, the second device using the profile of the user to generate a first challenge comprising a question and a corresponding response for authentication of the first device, the method comprising, upon successful authentication of the first device using the first challenge, the steps of collecting contextual information from the first device and updating the profile associated to the user of the first device with the received contextual information for a subsequent generation of a second challenge for authentication of the first device.
30 Citations
12 Claims
-
1. A method for authenticating a first device, the method being executed by a second device, the second device comprising a database, the database storing a profile associated to a user of the first device, the second device using the profile of the user to generate a first challenge comprising a question and a corresponding response for authentication of the first device, the method comprising, upon successful authentication of the first device using the first challenge, the steps of:
-
collecting contextual information from the first device, updating the profile associated to the user of the first device with the received contextual information for a subsequent generation of a second challenge for authentication of the first device. - View Dependent Claims (2, 3, 4, 10, 11, 12)
-
-
5. A server comprising a database, the database storing a profile associated to a user of a first device, the server being adapted for:
-
using the profile of the user to generate a first challenge comprising a question and a corresponding response for authentication of the first device, upon authentication of the first device, collecting contextual information from the first device, updating the profile associated to the user of the first device with the received contextual information for a subsequent generation of a second challenge for authentication of the first device.
-
-
6. An application program embodied on a non-transitory computer readable medium and arranged to execute a method for authenticating a first device, the method being executed by a second device, the second device comprising a database, the database storing a profile associated to a user of the first device, the second device using the profile of the user to generate a first challenge comprising a question and a corresponding response for authentication of the first device, the method comprising, upon successful authentication of the first device using the first challenge, the steps of:
-
collecting contextual information from the first device, updating the profile associated to the user of the first device with the received contextual information for a subsequent generation of a second challenge for authentication of the first device. - View Dependent Claims (7, 8, 9)
-
Specification