Systems and methods for implementing device-specific passwords
First Claim
1. A non-transitory computer-readable storage medium having computer-executable instructions thereon implementing a method for providing a user with access to a restricted service on a network, the user employing a particular computing device communicatively coupled to the network, the method comprising:
- receiving credentials from the user upon the user requesting access to the restricted service, the credentials including a user identifier and a master password that is not specific to the computing device;
obtaining from the computing device identifying indicia thereof that at least nearly uniquely identifies the computing device;
determining from the received user identifier an entry for the user in a credentials database;
determining from the entry for the user that the computing device is not registered as having a device-specific password for use by the user with the restricted service inasmuch as the obtained identifying indicia of the computing device does not appear in the entry, but that information on the master password in the received credentials appears in the entry;
granting the user access to the restricted service based on the information on the master password in the received credentials appearing in the entry;
obtaining from the user a device-specific password for the computing device upon granting the user access to the restricted service;
storing the obtained identifying indicia of the computing device and information on the obtained device-specific password for the computing device in a sub-entry of the entry for the user in the credentials database such that the computing device of the user corresponding to the obtained identifying indicia is registered as having a device-specific password for use by the user with the restricted service;
wherein the user at a later time may employ the registered computing device to access the restricted service with the corresponding device-specific password; and
directing the computing device to an appropriate feature site representative of the restrictive service based on a determined type of the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Each of multiple computing devices of a user is registered by obtaining therefrom identifying indicia, obtaining from the user a device-specific password for the computing device, and storing the obtained identifying indicia and device-specific password for the computing device in an entry for the user in a credentials database. The user requests access to a restricted service by way of a particular one of the multiple computing devices with credentials including the device-specific password for the particular computing device, and identifying indicia are obtained therefrom. The obtained identifying indicia and the device-specific password of the particular computing device appear in the entry, and the user is thus granted access to the restricted service.
-
Citations
21 Claims
-
1. A non-transitory computer-readable storage medium having computer-executable instructions thereon implementing a method for providing a user with access to a restricted service on a network, the user employing a particular computing device communicatively coupled to the network, the method comprising:
-
receiving credentials from the user upon the user requesting access to the restricted service, the credentials including a user identifier and a master password that is not specific to the computing device; obtaining from the computing device identifying indicia thereof that at least nearly uniquely identifies the computing device; determining from the received user identifier an entry for the user in a credentials database; determining from the entry for the user that the computing device is not registered as having a device-specific password for use by the user with the restricted service inasmuch as the obtained identifying indicia of the computing device does not appear in the entry, but that information on the master password in the received credentials appears in the entry; granting the user access to the restricted service based on the information on the master password in the received credentials appearing in the entry; obtaining from the user a device-specific password for the computing device upon granting the user access to the restricted service; storing the obtained identifying indicia of the computing device and information on the obtained device-specific password for the computing device in a sub-entry of the entry for the user in the credentials database such that the computing device of the user corresponding to the obtained identifying indicia is registered as having a device-specific password for use by the user with the restricted service; wherein the user at a later time may employ the registered computing device to access the restricted service with the corresponding device-specific password; and directing the computing device to an appropriate feature site representative of the restrictive service based on a determined type of the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 16)
-
-
8. A non-transitory computer-readable storage medium having computer-executable instructions thereon implementing a method for providing a user with access to a restricted service on a network, the user employing a particular computing device communicatively coupled to the network, the method comprising:
-
receiving credentials from the user upon the user requesting access to the restricted service, the credentials including a user identifier and a device-specific password specific to the computing device; obtaining from the computing device identifying indicia thereof that at least nearly uniquely identifies the computing device; determining from the received user identifier an entry for the user in a credentials database; determining from the entry for the user that the computing device is registered as having a device-specific password for use by the user with the restricted service inasmuch as the obtained identifying indicia of the computing device appears in a sub-entry of the entry, and that information on the device-specific password in the received credentials also appears in the sub-entry of the entry; granting the user access to the restricted service based on the obtained identifying indicia of the computing device appearing in the sub-entry of the entry and also on the information on the device-specific password in the received credentials appearing the sub-entry of the entry; and directing the computing device to an appropriate feature site representative of the restrictive service based on a determined type of the computing device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium having computer-executable instructions thereon implementing a method for providing a user with access to a restricted service on a network, the method comprising:
-
registering each of a plurality of computing devices of the user by; obtaining from the computing device identifying indicia thereof that at least nearly uniquely identifies the computing device; obtaining from the user a device-specific password to the computing device; storing the obtained identifying indicia of the computing device and information on the obtained device-specific password for the computing device in a sub-entry of an entry for the user in a credentials database; receiving credentials from the user upon the user requesting access to the restricted service by way of a particular one of the plurality of computing devices communicatively coupled to the network, the credentials including the device-specific password specific to the particular computing device; obtaining from the particular computing device identifying indicia thereof that at least nearly uniquely identifies the computing device; determining from the entry for the user that the particular computing device is registered inasmuch as the obtained identifying indicia of the computing device appears in a sub-entry of the entry, and that information on the device-specific password in the received credentials also appears in the sub-entry of the entry; granting the user access to the restricted service based on the obtained identifying indicia of the computing device appearing in the sub-entry of the entry and also on the information on the device-specific password in the received credentials appearing in the sub-entry of the entry; and directing the computing device to an appropriate feature site representative of the restrictive service based on a determined type of the computing device. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification