BINDING TO A USER DEVICE
First Claim
1. A method of providing access to a protected resource, comprising:
- obtaining a first authentication factor for a user that is accessing the resource using a computing device;
prompting the user to provide a second authentication factor;
accessing the second authentication factor using a pairing code;
determining if the second authentication factor is bound to the computing device; and
allowing the user to access the protected resource in response to the first and second authentication factors being valid and the second authentication factor being bound to the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Providing access to a protected resource includes obtaining a first authentication factor for a user that is accessing the resource using a computing device, prompting the user to provide a second authentication factor, accessing the second authentication factor using a pairing code, determining if the second authentication factor is bound to the computing device, and allowing the user to access the protected resource in response to the first and second authentication factors being valid and the second authentication factor being bound to the computing device. The user may be prompted to tap a card to provide the second authentication factor. The first authentication factor may be a login id and password combination. The login id and password may be cached in the computing device. The second authentication factor may be a security card. Information on the security card may be encrypted and may be accessible using a pairing code.
-
Citations
24 Claims
-
1. A method of providing access to a protected resource, comprising:
-
obtaining a first authentication factor for a user that is accessing the resource using a computing device; prompting the user to provide a second authentication factor; accessing the second authentication factor using a pairing code; determining if the second authentication factor is bound to the computing device; and allowing the user to access the protected resource in response to the first and second authentication factors being valid and the second authentication factor being bound to the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium containing software that provides access to a protected resource, the software comprising:
-
executable code that obtains a first authentication factor for a user that is accessing the resource using a computing device; executable code that prompts the user to provide a second authentication factor; executable code that accesses the second authentication factor using a pairing code; executable code that determines if the second authentication factor is bound to the computing device; and executable code that allows the user to access the protected resource in response to the first and second authentication factors being valid and the second authentication factor being bound to the computing device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification