Multifactor Contextual Authentication and Entropy from Device or Device Input or Gesture Authentication
First Claim
1. A method comprising:
- making available, by a first user device, a public key of the first user device to devices of a device mesh, wherein the first user device is in the device mesh;
receiving, at the first user device and from a user, a request to access one or more resources via the first user device;
in response to receiving the request to access the one or more resources, determining a second user device in the device mesh having access to the public key of the first user device;
sending, from the first user device to the second user device in the device mesh, a request for user input of a credential at the second user device;
receiving, at the first user device, the credential from the second user device; and
authenticating, by the first user device, the user based on the credential received from the second user device.
8 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for authenticating a user requesting to access one or more resources via a device are described herein. Authentication may be based on or otherwise rely on a plurality of devices. For example, aspects described herein are directed towards a system and method for receiving a request from a user to access one or more resources via a first device. In response to receiving the request to access the one or more resources, the first device may send, e.g., to a second device, a request for user input of a credential at the second device. The first device may receive a credential from the second device, and the first device may authenticate the user based on the received credential. Additionally or alternatively, the second device may authenticate the user based on an input of a user credential, and the second device may send an indication of a successful authentication to the first device.
-
Citations
20 Claims
-
1. A method comprising:
-
making available, by a first user device, a public key of the first user device to devices of a device mesh, wherein the first user device is in the device mesh; receiving, at the first user device and from a user, a request to access one or more resources via the first user device; in response to receiving the request to access the one or more resources, determining a second user device in the device mesh having access to the public key of the first user device; sending, from the first user device to the second user device in the device mesh, a request for user input of a credential at the second user device; receiving, at the first user device, the credential from the second user device; and authenticating, by the first user device, the user based on the credential received from the second user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
receiving, from a first user device and at a second user device, a request to authenticate a user requesting access to one or more resources via the first user device; in response to receiving the request to authenticate the user, generating for display on a display of the second user device or a display of the first user device a prompt for user input of a credential at the second user device; receiving, at the second user device, input of the credential from the user; authenticating, by the second user device, the user based on the input of the credential received from the user; and in response to authenticating the user, sending, from the second user device to the first user device, an indication of a successful authentication. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method comprising:
-
authenticating, at a first user device, a user requesting to access one or more resources via the first user device; in response to authenticating the user, initiating a session for the user on the first user device and generating state information for the session; in response to a determination that a second user device is in a same device mesh as the first user device, granting access to the session via the second user device by transferring the state information for the session to the second user device. - View Dependent Claims (19, 20)
-
Specification