×

Authentication using device ID

  • US 9,378,345 B2
  • Filed: 04/29/2014
  • Issued: 06/28/2016
  • Est. Priority Date: 04/29/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving, by an authentication server and from a user device, an authentication request, wherein the authentication request comprises device attributes of the user device and wherein the authentication request further includes login information of a user;

    determine, by the authentication server, whether the login information is valid;

    responsive to determining that the login information is valid, generating, by the authentication server, a first device identifier identifying the user device from which the authentication request was received using the device attributes of the user device from which the authentication request was received, the first device identifier includes randomly generated characters that uniquely identify the user device from which the authentication request was received and the first device identifier is generated based on the device attributes that uniquely identify the user device from which the authentication request was received;

    creating, by the authentication server, an authentication token, wherein the authentication token is signed with the first device identifier;

    transmitting, by the authentication server and to the user device from which the authentication request was received, the authentication token;

    receiving, by the authentication server, a request to access protected resources from a user device, wherein the request comprises the authentication token and device attributes of the user device from which the request to access protected resources was received;

    generating, by the authentication server, a second, comparison device identifier identifying the user device from which the request to access protected resources was received, the second, comparison device identifier being based on the device attributes of the user device from which the request to access protected resources was received and included in the request to access protected resources, the second, comparison device identifier including randomly generated characters that uniquely identify the user device from which the request to access protected resources was received and the second, comparison device identifier is generated based on the device attributes of the user device from which the request to access protected resources was received and included in the request to access protected resources that uniquely identify the user device from which the request to access protected resources was received;

    decrypting, by the authentication server, the received authentication token;

    retrieving, by the authentication server, the first device identifier accessed from the decrypted authentication token;

    validating, by the authentication server, the authentication token, wherein the validating comprises determining whether the first device identifier matches the second, comparison device identifier; and

    outputting, by the authentication server, a response.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×