AUTHENTICATOR CENTRALIZATION AND PROTECTION
First Claim
1. A computer implemented method for authenticating a user who is communicating with an enterprise via a network, comprising:
- receiving, via the network, authenticators for a user from a first user device associated with the user, and storing the received authenticators;
receiving, from the enterprise, a request to authenticate the user with an authentication policy for authenticating the user, wherein the request does not identify which of the stored authenticators is to be used for authenticating the user;
determining, a first authenticator from the stored authenticators to be used for authenticating the user based on the authentication policy received from the enterprise;
transmitting an authentication request to the first user device via the network requesting the first authenticator;
receiving, from the first user device via the network, an authenticator in response to the authentication request; and
authenticating the user by comparing the received authenticator with the stored first authenticator.
8 Assignments
0 Petitions
Accused Products
Abstract
Provided is a method for authenticating a user communicating with an enterprise via a network. The method includes receiving, via the network, authenticators for a user from a first user device associated with the user, and storing the received authenticators. A first authenticator from the stored authenticators is selected to be used for authenticating the user based on an authentication policy received from the enterprise. An authentication request is transmitted to a user device requesting the first authenticator and the user is authentication by by comparing the received authenticator with the stored first authenticator.
-
Citations
20 Claims
-
1. A computer implemented method for authenticating a user who is communicating with an enterprise via a network, comprising:
-
receiving, via the network, authenticators for a user from a first user device associated with the user, and storing the received authenticators; receiving, from the enterprise, a request to authenticate the user with an authentication policy for authenticating the user, wherein the request does not identify which of the stored authenticators is to be used for authenticating the user; determining, a first authenticator from the stored authenticators to be used for authenticating the user based on the authentication policy received from the enterprise; transmitting an authentication request to the first user device via the network requesting the first authenticator; receiving, from the first user device via the network, an authenticator in response to the authentication request; and authenticating the user by comparing the received authenticator with the stored first authenticator. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer implemented method for authenticating a user who is communicating with an enterprise via a network, comprising:
-
receiving, via the network, authenticators for a user from a first user device associated with the user and authenticators for a second user device associated with the user, and storing the received authenticators; receiving, from the enterprise, a request to authenticate the user with an authentication policy for authenticating the user, wherein the request does not identify which of the stored authenticators is to be used for authenticating the user; determining, a first authenticator from the stored authenticators to be used for authenticating the user based on the authentication policy received from the enterprise and selecting one of the first user device and the second user device to use for authentication; transmitting an authentication request to the selected one of the first user device and the second user device via the network requesting the first authenticator; receiving, from the selected one of the first user device and the second user device, an authenticator in response to the authentication request; and authenticating the user by comparing the received authenticator with the stored first authenticator. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. An article of manufacture for authenticating a user who is communicating with an enterprise via a network, comprising:
-
a non-transitory storage medium; and logic stored on the storage medium, wherein the stored logic is configured to be readable by a processor and thereby causes the processor to operate so as to; receive, via the network, authenticators for a user from a first user device associated with the user, and store the received authenticators; receive, from the enterprise, a request to authenticate the user with an authentication policy for authenticating the user, wherein the request does not identify which of the stored authenticators is to be used for authenticating the user; determine, a first authenticator from the stored authenticators to be used for authenticating the user based on the authentication policy received from the enterprise; transmit an authentication request to the first user device via the network requesting the first authenticator; receive, from the first user device via the network, an authenticator in response to the authentication request; and authenticate the user by comparing the received authenticator with the stored first authenticator. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification