AUTOMATED DEVICE DISCOVERY OF PAIRING-ELIGIBLE DEVICES FOR AUTHENTICATION
First Claim
1. A computer-implemented method for discovering pairing-eligible devices for authenticating a user on a computing device, comprising:
- generating and sending an interrogation request to a network resource for identifying one or more pairing-eligible devices actively connected to the network resource or one or more pairing-eligible device users associated with an event stored on the network resource;
in response to the interrogation request, receiving at least one encrypted token, wherein the at least one encrypted token comprises a unique identifier associated with a pairing-eligible device of the one or more pairing-eligible devices actively connected to the network resource or a unique identifier associated with a pairing-eligible device user of the one or more pairing-eligible device users associated with an event stored on the network resource;
identifying pairing-eligible devices associated with the at least one encrypted token;
generating a list of pairing-eligible devices associated with the at least one encrypted token;
displaying a user interface comprising the list of pairing-eligible devices;
receiving a selection of a pairing-eligible device from the list of pairing-eligible devices; and
inferring an identity of the user from the selected pairing-eligible device.
1 Assignment
0 Petitions
Accused Products
Abstract
Automated device discovery of pairing-eligible devices for authenticating an unidentified user of a computing device is provided. When the user initiates a login on the computing device on which the user'"'"'s identity is not known, an automated pairing-eligible device discovery authentication system interrogates a resource (e.g., subnetwork router, calendaring server) for identifying pairing-eligible devices that may be used as a second factor for authentication. A list of the pairing-eligible devices is presented to the user on the computing device. Upon selection of a pairing-eligible device to use as a second factor to verify the user'"'"'s identity, the user'"'"'s identity is determined, and a notification is sent to the selected pairing-eligible device for enabling the user to verify his/her identity using a second factor. Upon completion of an authentication challenge on the selected pairing-eligible device, authentication of the user is completed, and a signed token is sent to the computing device.
35 Citations
20 Claims
-
1. A computer-implemented method for discovering pairing-eligible devices for authenticating a user on a computing device, comprising:
-
generating and sending an interrogation request to a network resource for identifying one or more pairing-eligible devices actively connected to the network resource or one or more pairing-eligible device users associated with an event stored on the network resource; in response to the interrogation request, receiving at least one encrypted token, wherein the at least one encrypted token comprises a unique identifier associated with a pairing-eligible device of the one or more pairing-eligible devices actively connected to the network resource or a unique identifier associated with a pairing-eligible device user of the one or more pairing-eligible device users associated with an event stored on the network resource; identifying pairing-eligible devices associated with the at least one encrypted token; generating a list of pairing-eligible devices associated with the at least one encrypted token; displaying a user interface comprising the list of pairing-eligible devices; receiving a selection of a pairing-eligible device from the list of pairing-eligible devices; and inferring an identity of the user from the selected pairing-eligible device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for discovering pairing-eligible devices for authentication, comprising:
-
one or more processors for executing programmed instructions; memory, coupled to the one or more processors, for storing program instruction steps for execution by the computer processor; an authentication client operative to; generate and send an interrogation request to a network resource for identifying one or more pairing-eligible devices actively connected to the network resource or one or more pairing-eligible device users associated with an event stored on the network resource; in response to the interrogation request, receive at least one encrypted token, wherein the at least one encrypted token comprises a unique identifier associated with a pairing-eligible device of the one or more pairing-eligible devices actively connected to the network resource or a unique identifier associated with a pairing-eligible device user of the one or more pairing-eligible device users associated with an event stored on the network resource; and an authentication service operative to; identify pairing-eligible devices associated with the at least one encrypted token; generate a list of pairing-eligible devices associated with the at least one encrypted token; receive an indication of a selection of a pairing-eligible device from the list of pairing-eligible devices; and infer an identity of the user from the selected pairing-eligible device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A device for discovering pairing-eligible devices for authentication, the device operative to:
-
generate and send an interrogation request to a network resource for identifying one or more pairing-eligible devices actively connected to the network resource or one or more pairing-eligible device users associated with an event stored on the network resource; in response to the interrogation request, receive at least one encrypted token, wherein the at least one encrypted token comprises a unique identifier associated with a pairing-eligible device of the one or more pairing-eligible devices actively connected to the network resource or a unique identifier associated with a pairing-eligible device user of the one or more pairing-eligible device users associated with an event stored on the network resource; generate a pairing device discovery request comprising the at least one encrypted token; send the pairing device discovery request to an authentication service for identifying pairing-eligible devices associated with the at least one encrypted token; receive a list of pairing-eligible devices associated with the at least one encrypted token; display a user interface comprising the list of pairing-eligible devices; and receive a selection of a pairing-eligible device from the list of pairing-eligible devices, wherein an identity of the user is inferred from the selected pairing-eligible device.
-
Specification