Security device provisioning
First Claim
1. A method for provisioning a security token for a user, the method comprising:
- receiving a security token provisioning request from a mobile device over a network;
in response to receiving the security token provisioning request, transmitting, to the mobile device over the network, an authentication request configured to prompt a user of the mobile device to provide authentication information related to a user identity;
receiving, from the mobile device over the network, the authentication information related to the user identity;
authenticating the user identity against an enterprise data store using the authentication information by comparing the authentication information with reference authentication information in the data store without the use of a unique token identifier from the security token;
initiating the extraction of the unique token identifier from the security token without intervention from the user in response to a successful authentication of the user identity, wherein initiating the extraction of the unique token identifier comprises transmitting instructions to a web enabled application for initiating a security application running on the mobile device to read the unique token identifier from the security token;
receiving, from the mobile device over the network, the extracted unique token identifier sent by the mobile device in response to a successful extraction of the unique token identifier;
in response to receiving the extracted unique token identifier from the mobile device, associating the unique token identifier with the user identity in the data store by storing the unique token identifier in the data store in association with the user identity; and
authenticating the user for access to a computing resource based at least partially upon a subsequent validation of the security token against the unique token identifier retrieved from the data store.
4 Assignments
0 Petitions
Accused Products
Abstract
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a mobile device. A security token object provisioning request may be received from the mobile device. In response, an authentication request may be transmitted. The user is authenticated against a user identity based upon a set of received identity credentials provided by the user. The extraction of a unique token identifier from the security token object is initiated, and completed without intervention from the user. The unique token identifier received from the client computer system is associated with to the user identity in a data store. By providing the security token object, the user can gain access to the computing resource.
30 Citations
20 Claims
-
1. A method for provisioning a security token for a user, the method comprising:
-
receiving a security token provisioning request from a mobile device over a network; in response to receiving the security token provisioning request, transmitting, to the mobile device over the network, an authentication request configured to prompt a user of the mobile device to provide authentication information related to a user identity; receiving, from the mobile device over the network, the authentication information related to the user identity; authenticating the user identity against an enterprise data store using the authentication information by comparing the authentication information with reference authentication information in the data store without the use of a unique token identifier from the security token; initiating the extraction of the unique token identifier from the security token without intervention from the user in response to a successful authentication of the user identity, wherein initiating the extraction of the unique token identifier comprises transmitting instructions to a web enabled application for initiating a security application running on the mobile device to read the unique token identifier from the security token; receiving, from the mobile device over the network, the extracted unique token identifier sent by the mobile device in response to a successful extraction of the unique token identifier; in response to receiving the extracted unique token identifier from the mobile device, associating the unique token identifier with the user identity in the data store by storing the unique token identifier in the data store in association with the user identity; and authenticating the user for access to a computing resource based at least partially upon a subsequent validation of the security token against the unique token identifier retrieved from the data store. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An article of manufacture comprising a non-transitory program storage medium readable by a data processing apparatus, the medium tangibly embodying one or more programs of instructions executable by the data processing apparatus to perform a method for provisioning a security token for a user for accessing a computing resource through a mobile device, the method comprising:
-
receiving a security token provisioning request from the mobile device over a network; in response to receiving the security token provisioning request, transmitting, to the mobile device over the network, an authentication request configured to prompt the user of the mobile device to provide authentication information related to a user identity; receiving, from the mobile device over the network, the authentication information related to the user identity; authenticating the user identity against an enterprise data store using the authentication information by comparing the authentication information with reference authentication information in the data store without the use of a unique token identifier from the security token; initiating the extraction of the unique token identifier from the security token without intervention from the user in response to a successful authentication of the user identity, wherein initiating the extraction of the unique token identifier comprises transmitting instructions to a web enabled application for initiating a security application running on the mobile device to read the unique token identifier from the security token; receiving, from the mobile device over the network, the extracted unique token identifier sent by the mobile device in response to a successful extraction of the unique token identifier; in response to receiving the extracted unique token identifier from the mobile device, associating the unique token identifier with the user identity in the data store by storing the unique token identifier in the data store in association with the user identity; and authenticating the user for access to the computing resource based at least partially upon a subsequent validation of the security token against the unique token identifier retrieved from the data store. - View Dependent Claims (14, 15, 16)
-
-
17. A computing system for provisioning a security token to a user for accessing a computing resource through a mobile device, the system comprising:
-
one or more computer readable storage devices configured to store; a plurality of computer executable instructions; one or more hardware computer processors in communication with the one or more computer readable storage devices and configured to execute the plurality of computer executable instructions in order to cause the computing system to; receive a security token provisioning request from the mobile device over a network for the security token interfacing with the mobile device; in response to receiving the security token provisioning request, transmit, to the mobile device over the network, an authentication request configured to prompt a user of the mobile device to provide authentication information related to a user identity; receive, from the mobile device over the network, the authentication information related to the user identity; authenticate the user identity against an enterprise data store using the authentication information by comparing the authentication information with reference authentication information in the data store without the use of a unique token identifier from the security token; initiate the extraction of the unique token identifier from the security token without intervention from the user in response to a successful authentication of the user identity, wherein initiating the extraction of the unique token identifier comprises transmitting instructions to a web enabled application for initiating a security application running on the mobile device to read the unique token identifier from the security token; receive, from the mobile device over the network, the extracted unique token identifier in response to a successful extraction of the unique token identifier; in response to receiving the extracted unique token identifier from the mobile device, associate the unique token identifier with the user identity in the data store by storing the unique token identifier in the data store in association with the user identity; and authenticate the user for access to the computing resource based at least partially upon a subsequent validation of the security token against the unique token identifier retrieved from the data store. - View Dependent Claims (18, 19, 20)
-
Specification