×

Security device provisioning

  • US 9,338,155 B2
  • Filed: 08/12/2013
  • Issued: 05/10/2016
  • Est. Priority Date: 02/25/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for provisioning a security token for a user, the method comprising:

  • receiving a security token provisioning request from a mobile device over a network;

    in response to receiving the security token provisioning request, transmitting, to the mobile device over the network, an authentication request configured to prompt a user of the mobile device to provide authentication information related to a user identity;

    receiving, from the mobile device over the network, the authentication information related to the user identity;

    authenticating the user identity against an enterprise data store using the authentication information by comparing the authentication information with reference authentication information in the data store without the use of a unique token identifier from the security token;

    initiating the extraction of the unique token identifier from the security token without intervention from the user in response to a successful authentication of the user identity, wherein initiating the extraction of the unique token identifier comprises transmitting instructions to a web enabled application for initiating a security application running on the mobile device to read the unique token identifier from the security token;

    receiving, from the mobile device over the network, the extracted unique token identifier sent by the mobile device in response to a successful extraction of the unique token identifier;

    in response to receiving the extracted unique token identifier from the mobile device, associating the unique token identifier with the user identity in the data store by storing the unique token identifier in the data store in association with the user identity; and

    authenticating the user for access to a computing resource based at least partially upon a subsequent validation of the security token against the unique token identifier retrieved from the data store.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×