Managing access to an on-demand service
First Claim
Patent Images
1. A method comprising:
- receiving, from a client device, a first request including authentication information for a user and information identifying the client device, the information identifying the client device including an IP address;
validating the authentication information of the user, the authentication information associated with a user account;
responsive to validating the authentication information of the user, determining whether the IP address is associated with a location associated with the user account; and
responsive to determining that the IP address is not associated with the location associated with the user account;
sending a token to a channel associated with the user account,receiving, from the client device, a second request including the token sent to the channel associated with the user account, andresponsive to receiving the second request including the token from the client device, authenticating the user.
1 Assignment
0 Petitions
Accused Products
Abstract
In accordance with embodiments, there are provided mechanisms and methods for managing a risk of access to an on-demand service as a condition of permitting access to the on-demand service. These mechanisms and methods for providing such management can enable embodiments to help prohibit an unauthorized user from accessing an account of an authorized user when the authorized user inadvertently loses login information. The ability of embodiments to provide such management may lead to an improved security feature for accessing on-demand services.
81 Citations
16 Claims
-
1. A method comprising:
-
receiving, from a client device, a first request including authentication information for a user and information identifying the client device, the information identifying the client device including an IP address; validating the authentication information of the user, the authentication information associated with a user account; responsive to validating the authentication information of the user, determining whether the IP address is associated with a location associated with the user account; and responsive to determining that the IP address is not associated with the location associated with the user account; sending a token to a channel associated with the user account, receiving, from the client device, a second request including the token sent to the channel associated with the user account, and responsive to receiving the second request including the token from the client device, authenticating the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer readable medium configured to store instruction, the instructions when executed by a processor, cause the processor to:
-
receive, from a client device, a first request including authentication information for a user and information identifying the client device, the information identifying the client device including an IP address; validate the authentication information of the user, the authentication information associated with a user account; responsive to validating the authentication information of the user, determine whether the IP address is associated with a location associated with user account; and responsive to determining that the IP address is not associated with the location associated with the user account; send a token to a channel associated with the user account, receive, from the client device, a second request including the token sent to the channel associated with the user account, and responsive to receiving the second request including the token from the client device, authenticate the user. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification