Systems and methods for anonymous authentication using multiple devices
First Claim
1. A method of authentication using at least two user devices of an associated set of user devices, the method comprising:
- registering each user device of an associated set of user devices with an authenticator computing device, wherein each of the user devices of the associated set of user devices are registered to at least one user;
receiving, at the authenticator computing device, a request to access a resource from one user device of the associated set of user devices, wherein the one user device requesting access to the resource is registered to more than one user;
generating an authentication challenge at the authenticator computing device in response to the request;
transmitting the authentication challenge to one user device of a subset of user devices of the associated set of user devices registered with the authenticator computing device, wherein the subset of user devices comprises at least one user device other than the one user device requesting access to the resource;
transmitting the authentication challenge from the one user device of the subset of user devices to one or more other user devices of the subset of user devices;
generating at least one response to the authentication challenge at one or more user devices of the subset of user devices;
transmitting the at least one response to the authenticator computing device;
determining, at the authenticator computing device, if the at least one response constitutes a valid response to the authentication challenge; and
granting any one or more of the user devices of the associated set of user devices registered with the authenticator computing device access to the resource if the at least one response received at the authenticator computing device constitutes a valid response to the authentication challenge.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method of anonymous authentication is described. In operation, the authenticator receives a request to access a resource from one of the user devices of an associated set of user devices, wherein each of the user devices is registered to at least one user requesting access to the resource registered to at least two users. The authenticator generates and transmits an authentication challenge in response to the request to a subset of the user devices. A user device subsequently generates and transmits a response to the authentication challenge to the authenticator. The authenticator determines whether the responses received from the one or more user devices constitutes a valid response and grants any one or more of the user devices of the associated set of user devices access to the resource if the responses received from the user devices constitutes a valid response to the authentication challenge.
20 Citations
29 Claims
-
1. A method of authentication using at least two user devices of an associated set of user devices, the method comprising:
-
registering each user device of an associated set of user devices with an authenticator computing device, wherein each of the user devices of the associated set of user devices are registered to at least one user; receiving, at the authenticator computing device, a request to access a resource from one user device of the associated set of user devices, wherein the one user device requesting access to the resource is registered to more than one user; generating an authentication challenge at the authenticator computing device in response to the request; transmitting the authentication challenge to one user device of a subset of user devices of the associated set of user devices registered with the authenticator computing device, wherein the subset of user devices comprises at least one user device other than the one user device requesting access to the resource; transmitting the authentication challenge from the one user device of the subset of user devices to one or more other user devices of the subset of user devices; generating at least one response to the authentication challenge at one or more user devices of the subset of user devices; transmitting the at least one response to the authenticator computing device; determining, at the authenticator computing device, if the at least one response constitutes a valid response to the authentication challenge; and granting any one or more of the user devices of the associated set of user devices registered with the authenticator computing device access to the resource if the at least one response received at the authenticator computing device constitutes a valid response to the authentication challenge. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. One or more non-transitory computer-readable media having computer-executable instructions for performing a method of running a software program on a computing device, the method including issuing instructions from the software program, the instructions comprising:
-
registering each user device of an associated set of user devices with an authenticator computing device, wherein each of the user devices of the associated set of user devices are registered to at least one user; receiving, at the authenticator computing device, a request to access a resource from one user device of the associated set of user devices, wherein the one user device requesting access to the resource is registered to more than one user; generating an authentication challenge at the authenticator computing device in response to the request; transmitting the authentication challenge to one user device of a subset of user devices of the associated set of user devices registered with the authenticator computing device, wherein the subset of user devices comprises at least one user device other than the one user device requesting access to the resource; transmitting the authentication challenge from the one user device of the subset of user devices to one or more other user devices of the subset of user devices; generating at least one response to the authentication challenge at one or more user devices of the subset of user devices; transmitting the at least one response to the authenticator computing device;
determining, at the authenticator computing device, if the at least one response constitutes a valid response to the authentication challenge; andgranting any one or more of the user devices of the associated set of user devices registered with the authenticator computing device access to the resource if the at least one response received at the authenticator computing device constitutes a valid response to the authentication challenge. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. An authentication system comprising:
-
an authenticator computing device configured to register each user device of an associated set of user devices with the authenticator computing device, wherein each of the user devices of the associated set of user devices are registered to at least one user, the authenticator computing device further configured to receive a request to access a resource from one user device of the associated set of user devices, wherein the one user device requesting access to the resource is registered to at least two users and with the authenticator computing device, to generate an authentication challenge in response to the request, to transmit the authentication challenge to one user of a subset of user devices of the associated set of user devices registered with the authenticator computing device and to transmit the authentication challenge from the one user device of the subset of user devices to one or more other user devices of the subset of user devices, wherein the subset of user devices comprises at least one device other than the one user device requesting access to the resource or to transmit the authentication challenge to the user device requesting access to a resource for subsequent transmission of the authentication challenge from the user device requesting access to a resource to the other user device(s) of the subset, to receive at least one response to the authentication challenge from one or more user devices of the subset of user devices, to determine if the at least one response constitutes a valid response to the authentication challenge and to grant any one or more of the user devices of the associated set of user devices registered with the authenticator computing device access to the resource if the at least one response received constitutes a valid response to the authentication challenge. - View Dependent Claims (28, 29)
-
Specification