CREDENTIAL STORAGE ACROSS MULTIPLE DEVICES
First Claim
1. A computer system, comprising:
- one or more processors; and
memory having program instructions stored therein that are executable by the one or more processors to cause the computer system to perform operations including;
storing registration information identifying a plurality of devices as being registered to an organization;
receiving, over a network from a first device, a first request for credential information of a first of a plurality of users associated with the organization;
authenticating the first request, including;
verifying that the first device is being used by the first user; and
determining, based on the registration information, whether the first device is one of the plurality of devices; and
based on the authenticating, granting or denying the first request for the credential information.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are disclosed relating to accessing credential information on multiple devices. In one embodiment, a computer system is disclosed that includes one or processors and memory having program instructions stored therein that are executable by the one or more processors to cause the computer system to perform operations. The operations include storing registration information identifying a plurality of devices as being registered to an organization and receiving, over a network from a first device, a request for credential information of a first of a plurality of users associated with the organization. The operations further include authenticating the first request, including verifying that the first device is being used by the first user and determining, based on the registration information, whether the first device is one of the plurality of devices. The operations include granting or denying the first request for the credential information based on the authenticating.
-
Citations
20 Claims
-
1. A computer system, comprising:
-
one or more processors; and memory having program instructions stored therein that are executable by the one or more processors to cause the computer system to perform operations including; storing registration information identifying a plurality of devices as being registered to an organization; receiving, over a network from a first device, a first request for credential information of a first of a plurality of users associated with the organization; authenticating the first request, including; verifying that the first device is being used by the first user; and determining, based on the registration information, whether the first device is one of the plurality of devices; and based on the authenticating, granting or denying the first request for the credential information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computing device, comprising:
-
one or more processors; and memory having program instructions stored therein that are executable by the computing device to cause the computing device to perform operations including; storing information indicative of a first password usable by a first user to access the computing device and information indicative of a second password usable by a second user to access the computing device; while storing credential information for the first user, issuing a request for credential information of the second user to a remote storage system, wherein the request specifies the information indicative of second password of the second user; and in response to receiving the credential information of the second user from the storage system, storing the credential information of the second user on the computing device, wherein the credential information of the second user includes information usable to authenticate the second user. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
a storage system storing credential information for a plurality of users that share a plurality of devices associated with an organization; the storage system receiving policy information from the organization, wherein the policy information specifies a first policy and a second policy, wherein the first policy defines criteria for passwords usable by a first set of users in the plurality of users to access the credential information, wherein the second policy defines criteria for passwords usable by a second set of users in the plurality of users to access the credential information, and wherein the criteria defined by the first policy differ from the criteria defined by the second policy; and the storage system permitting a user of the first set to access credential information associated with the user in response to the user presenting a password that is in accordance with the first policy. - View Dependent Claims (18, 19, 20)
-
Specification