Methods and systems for providing scalable authentication
First Claim
Patent Images
1. A method of authenticating a plurality of user computing devices for access to an on-line group activity, the method comprising:
- (a) establishing, by a server computing device, a first authenticator for the on-line group activity, the authenticator being one of the plurality of user computing devices;
(b) determining, by one of the plurality of user computing devices, that more authenticators are needed, the determining comprising determining that the number of authenticators does not exceed a predetermined threshold; and
(c) promoting, by one of the plurality of user computing devices and in response to step (b), a member of the plurality of user computing devices to an authenticator after the member is authenticated, wherein the promoted member is able to communicate with and authenticate other user computing devices.
15 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems of authenticating a plurality of users for access to an on-line group activity are described. The systems and methods prevent overloading of any participant'"'"'s computer due to authentication. In some configurations, multiple endpoints are designated as authenticators and requests for authentication are load balanced amongst the authenticators.
-
Citations
33 Claims
-
1. A method of authenticating a plurality of user computing devices for access to an on-line group activity, the method comprising:
-
(a) establishing, by a server computing device, a first authenticator for the on-line group activity, the authenticator being one of the plurality of user computing devices; (b) determining, by one of the plurality of user computing devices, that more authenticators are needed, the determining comprising determining that the number of authenticators does not exceed a predetermined threshold; and (c) promoting, by one of the plurality of user computing devices and in response to step (b), a member of the plurality of user computing devices to an authenticator after the member is authenticated, wherein the promoted member is able to communicate with and authenticate other user computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for authenticating a plurality of users for access to an on-line group activity, the system comprising:
-
a server computing device, comprising a processor, that determines a first authenticator for the on-line group activity, the authenticator being one of the plurality of users; a determination module that determines that more authenticators are needed when the number of authenticators does not exceed a predetermined threshold; and a promoter that promotes, in response to the determination module'"'"'s determination, a member of the plurality of users to an authenticator after the member is authenticated, wherein the promoted member is able to communicate with and authenticate other users. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
Specification