System and methods for authorizing operations on a service using trusted devices
First Claim
1. A method for ensuring confidentiality of information used during authentication and authorization operations, the method comprising:
- receiving a request from a first user to perform an operation for a service;
identifying a second user responsible for authorizing the operation of the service, the second user being different from the first user;
selecting, based on a database of trusted devices, a trusted device associated with the second user for authorizing the operation of the service;
establishing a secure connection with the trusted device;
sending to the trusted device via the secure connection a request to the second user to enter confidential information on the trusted device for authorizing to authorize the operation of the service;
receiving the confidential information from the trusted device; and
determining whether to authorize the operation of the service based on the confidential information.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for ensuring confidentiality of information of a user of a service. One example method includes receiving a request to perform an operation for a service; selecting, based on a database of trusted devices, a trusted device for authorizing the operation of the service; establishing a secure connection with the trusted device; sending to the trusted device via the secure connection a request to enter confidential information on the trusted device to authorize the operation of the service; receiving the confidential information from the trusted device; and determining whether to authorize the operation of the service based on the confidential information.
19 Citations
15 Claims
-
1. A method for ensuring confidentiality of information used during authentication and authorization operations, the method comprising:
-
receiving a request from a first user to perform an operation for a service; identifying a second user responsible for authorizing the operation of the service, the second user being different from the first user; selecting, based on a database of trusted devices, a trusted device associated with the second user for authorizing the operation of the service; establishing a secure connection with the trusted device; sending to the trusted device via the secure connection a request to the second user to enter confidential information on the trusted device for authorizing to authorize the operation of the service; receiving the confidential information from the trusted device; and determining whether to authorize the operation of the service based on the confidential information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for ensuring confidentiality of information used during authentication and authorization operations, the system comprising:
a processor configured to; receive a request from a first user to perform an operation for a service; identify a second user responsible for authorizing the operation of the service, the second user being different from the first user; select, based on a database of trusted devices, a trusted device associated with the second user for authorizing the operation of the service; establish a secure connection with the trusted device; send to the trusted device via the secure connection a request to the second user to enter confidential information on the trusted device for authorizing the operation of the service; receive the confidential information from the trusted device; and determine whether to authorize the operation of the service based on the confidential information. - View Dependent Claims (7, 8, 9, 10)
-
11. A non-transitory computer-readable storage medium having a computer program product stored thereon, the computer-readable storage medium comprising computer-executable instructions for ensuring confidentiality of information used during authentication and authorization operations, the instructions comprising:
-
receiving a request from a first user to perform an operation for a service; identifying a second user responsible for authorizing the operation of the service, the second user being different from the first user; selecting, based on a database of trusted devices, a trusted device associated with the second user for authorizing the operation of the service; establishing a secure connection with the trusted device; sending to the trusted device via the secure connection a request to the second user to enter confidential information on the trusted device for authorizing to of the operation of the service; receiving the confidential information from the trusted device; and determining whether to authorize the operation of the service based on the confidential information. - View Dependent Claims (12, 13, 14, 15)
-
Specification