Allowing access to applications based on user authentication
First Claim
1. A computer-implemented method to authenticate users to allow access to applications on user computing devices, comprising:
- communicating, by a mobile computing devices, a request for user authorization data to two or more authentication technologies operating on the mobile computing device associated with a user;
receiving, by the mobile computing devices, the user authentication data from the two or more authentication technologies operating on the mobile computing device;
comparing, by the mobile computing devices, the user authentication data to a set of stored authorization data associated with the user;
identifying, by the mobile computing devices, an authentication state of the user for each of the two or more authentication technologies based on a match of the user authentication data and the set of stored user authentication data;
determining, by the mobile computing devices, that a match exists for the user authentication data for a first authentication technology of the two or more authentication technologies and the set of stored user authentication data, and that a match does not exist for the user authentication data for a second authentication technology of the two or more authentication technologies and the set of stored user authentication data;
allowing, by the mobile computing device, access to a first application of the one or more applications operating on the mobile computing device based on the determination; and
denying, by the mobile computing device, access to a second application of the one or more applications operating on the mobile computing device based on the determination.
2 Assignments
0 Petitions
Accused Products
Abstract
Authenticating users comprises a computing device that receives a manual authentication input of a user and initiates a first user session between the user and the user computing device. The device communicates a request for a first user authorization data from an authentication technology associated with the one or more computing devices and receives the first user authentication data. The user or the device terminates the first user session and subsequently receives an input of the user to initiate a second user session. The device communicates a request for second user authentication data from the authentication technology and compares the first user authentication data and the second user authentication data. The device identifies a match of one or more features of the first user authentication data and one or more features of the second user authentication data and authorizes the user to conduct the second user session.
-
Citations
22 Claims
-
1. A computer-implemented method to authenticate users to allow access to applications on user computing devices, comprising:
-
communicating, by a mobile computing devices, a request for user authorization data to two or more authentication technologies operating on the mobile computing device associated with a user; receiving, by the mobile computing devices, the user authentication data from the two or more authentication technologies operating on the mobile computing device; comparing, by the mobile computing devices, the user authentication data to a set of stored authorization data associated with the user; identifying, by the mobile computing devices, an authentication state of the user for each of the two or more authentication technologies based on a match of the user authentication data and the set of stored user authentication data; determining, by the mobile computing devices, that a match exists for the user authentication data for a first authentication technology of the two or more authentication technologies and the set of stored user authentication data, and that a match does not exist for the user authentication data for a second authentication technology of the two or more authentication technologies and the set of stored user authentication data; allowing, by the mobile computing device, access to a first application of the one or more applications operating on the mobile computing device based on the determination; and denying, by the mobile computing device, access to a second application of the one or more applications operating on the mobile computing device based on the determination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product, comprising:
a non-transitory computer-readable storage device having computer-executable program instructions embodied thereon that when executed by a computer cause the computer to authenticate users to access applications, the computer readable instructions comprising; computer-executable program instructions to receive user authentication data from two or more authentication technologies operating on the computer associated with a user; computer-executable program instructions to compare the user authentication data to a set of stored authorization data associated with the user; computer-executable program instructions to identify an authentication state of the user for each of the two or more authentication technologies based on a match of the user authentication data and the set of stored user authentication data for each particular authentication technology; computer-executable program instructions to determine that a match exists for the user authentication data for a first authentication technology of the two or more authentication technologies and the set of stored user authentication data, and that a match foes not exist for the user authentication data for a second authentication technology of the two or more authentication technologies and the set of stored user authentication data; and computer-executable program instructions to allow access to a first application of the one or more applications operating on the mobile computing device based on the determination. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
18. A system to authenticate users to allow access to applications, comprising:
-
one or more authentication technologies; a storage device; and a processor communicatively coupled to the storage device, wherein the processor executes application code instructions that are stored in the storage device to cause the system to; receive user authentication data from two or more authentication technologies of the system; compare the user authentication data to a set of authorization data associated with a user and stored in the storage device; identify an authentication state of the user for each of the one or more authentication technologies based on a match of the received user authentication data and the set of stored user authentication data; generate a user authentication rating based on the authentication state of the user for each of the two or more authentication technologies;
wherein a higher authentication state is generated if a match exists for at least two of the two or more authentication technologies and a lower authentication state if generated if a match exists for one or less of the two or more authentication technologies;allow access to a first application based on the generated user authentication rating being higher than a rating required to allow access to the first application; and deny access to a second application based on the generated user authentication rating being lower than a rating required to allow access to the second application. - View Dependent Claims (19, 20, 21, 22)
-
Specification