TWO FACTOR AUTHENTICATION WITH AUTHENTICATION OBJECTS
First Claim
Patent Images
1. A computer-implemented method, comprising:
- providing a graphical user interface that makes an authentication object available for selection, the graphical user interface including graphical representations of sets of actions for authenticating by corresponding service provider systems, including a graphical representation that represents a set of actions for authenticating an identity by a service provider system;
receiving user input indicating selection of the authentication object; and
in response to the receiving the user input indicating selection of the authentication object, performing the set of actions for authenticating the identity by the service provider system.
1 Assignment
0 Petitions
Accused Products
Abstract
Representations of authentication objects are provided for selection via an interface. An authentication object may be generated to include information obtained from one or more sensors of a device. A selected authentication object may contain information sufficient for authentication with a corresponding system. The interface may provide multiple representations of authentication objects that are usable with different service providers. The interface, executed by a first device, may be configured to authenticate a second device.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
providing a graphical user interface that makes an authentication object available for selection, the graphical user interface including graphical representations of sets of actions for authenticating by corresponding service provider systems, including a graphical representation that represents a set of actions for authenticating an identity by a service provider system; receiving user input indicating selection of the authentication object; and in response to the receiving the user input indicating selection of the authentication object, performing the set of actions for authenticating the identity by the service provider system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
one or more computing devices including one or more processors and memory, the memory including executable instructions that, as a result of execution by the one or more processors, cause the system to; receive an authentication object usable to authenticate an identity to a service provider system, the authentication object selected via a graphic interface including graphical representations of sets of actions for authenticating by corresponding systems including the service provider system; and provide an authentication claim to the service provider system to facilitate performance of an operation involving interaction with the service provider system, the authentication claim generated based on the authentication object. - View Dependent Claims (9, 10, 11, 12, 13)
-
14. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of execution by one or more processors of a first computer system, cause the first computer system to at least:
-
cause, as a result of an attempt by the first computer system to access a resource of a service provider, a graphical user interface to be displayed on a second computer system, the graphical user interface including a plurality of graphical representations including a graphical representation that represents a set of actions for authenticating an identity by a service provider system, and generate, based at least in part on a set of credentials received as a result of a selection from the plurality of graphical representations made via the second computer system, an authentication claim sufficient to authenticate with the service provider. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification