Supporting proximity based security code transfer from mobile/tablet application to access device
First Claim
1. A method for performing a two-factor authentication process, the method comprising:
- detecting a mobile computing device being positioned within a specified proximity of a computing device;
establishing a connection with the mobile computing device;
receiving, over the connection, a security value;
passing the security value to a browser helper object on the computing device;
populating a login form with the security value, wherein the login form is rendered on a browser executing on the computing device, wherein the login form includes fields for a username, a password, and the security value, and wherein the browser helper object populates the field for the security value with the security value; and
posting the login form to a network application.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques are disclosed for authenticating users to a computing application. A mobile or tablet device is used to generate a security code. Near field communication (NFC) hardware on the mobile device is used to transfer the security code from the mobile device to a computer. To transfer the one-time value, a user simply taps an NFC enabled mobile device on an NFC enabled computing device (e.g. a laptop running a web browser used to access a web service). In one embodiment, doing so triggers a connection between the two devices and an application running on the mobile device transfers the security code to an NFC receiver application running on the computer. The receiving computer may be configured to auto-fill the received security code in the appropriate form field of the application authentication interface.
154 Citations
15 Claims
-
1. A method for performing a two-factor authentication process, the method comprising:
-
detecting a mobile computing device being positioned within a specified proximity of a computing device; establishing a connection with the mobile computing device; receiving, over the connection, a security value; passing the security value to a browser helper object on the computing device; populating a login form with the security value, wherein the login form is rendered on a browser executing on the computing device, wherein the login form includes fields for a username, a password, and the security value, and wherein the browser helper object populates the field for the security value with the security value; and posting the login form to a network application. - View Dependent Claims (2, 3, 4)
-
-
5. A method for performing a two-factor authentication process, the method comprising:
-
detecting, by a mobile computing device, that the mobile computing device is positioned within a specified proximity of a computing device; in response; generating a security value, establishing a connection with the computing device, and passing, over the connection, the security value to the computing device, wherein a browser helper object on the computing device is configured to populate a login form rendered by a browser application with the security value. - View Dependent Claims (6)
-
-
7. A non-transitory computer-readable storage medium storing instructions, which, when executed on a processor, performs an operation for performing a two-factor authentication process, the operation comprising:
-
detecting a mobile computing device being positioned within a specified proximity of a computing device; establishing a connection with the mobile computing device; receiving, over the connection, a security value; passing the security value to a browser helper object on the computing device; populating a login form with the security value, wherein the login form is rendered on a browser executing on the computing device, wherein the login form includes fields for a username, a password, and the security value, and wherein the browser helper object populates the field for the security value with the security value; and posting the login form to a network application. - View Dependent Claims (8, 9, 10)
-
-
11. A system, comprising:
-
a near field communications (NFC) transceiver; a processor; and a memory hosting an application, which, when executed on the processor, performs an operation for performing a two-factor authentication process, the operation comprising; detecting a mobile computing device being positioned within a specified proximity of a computing device, establishing, via the NFC transceiver, a connection with the mobile computing device, receiving, over the connection, a security value, passing the security value to a browser helper object on the computing device, populating a login form with the security value, wherein the login form is rendered on a browser executing on the computing device, wherein the login form includes fields for a username, a password, and the security value, and wherein the browser helper object populates the field for the security value with the security value, and posting the login form to a network application. - View Dependent Claims (12, 13)
-
-
14. A mobile computing device, comprising:
-
a near field communications (NFC) transceiver; a processor; and a memory hosting an application, which, when executed on the processor, performs an operation for performing a two-factor authentication process, the operation comprising detecting, by the mobile computing device, that the mobile computing device is positioned within a specified proximity of a computing device; in response; generating a security value, establishing a connection with the computing device, and passing, over the connection, the security value to the computing device, wherein a browser helper object on the computing device is configured to populate a login form rendered by a browser application with the security value. - View Dependent Claims (15)
-
Specification