Approaches for providing multi-factor authentication credentials
First Claim
1. A non-transitory computer-readable medium embodying a first application and a second application executable in at least one computing device, wherein when executed the first application and the second application cause the at least one computing device to at least:
- determine that the first application has requested an authentication;
cause a first user interface to be rendered by the second application, the first user interface eliciting a user approval of the authentication;
generate a one-time password by the second application;
automatically transfer the one-time password to the first application in response to receiving the user approval;
cause a second user interface to be rendered by the first application, the second user interface including a first form field prepopulated with the one-time password and a second form field configured to receive a user-specified security credential;
submit the user-specified security credential to a first authentication service; and
submit the one-time password to a second authentication service and not directly to the first authentication service, the second authentication service acting as a proxy for the first authentication service, wherein the first authentication service is configured to perform the authentication using the one-time password received from the second authentication service and the user-specified security credential received from the at least one computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for providing multi-factor authentication credentials. For example, a first application may send an authentication request to a first authentication service, where the request specifies a first authentication factor. A second application may generate a user interface upon a display, where the user interface facilitates entry of a user approval. In response to receiving the user approval, the second application may send a second authentication factor to a second authentication service that acts as a proxy for the first authentication service. In some embodiments, an application may be configured to automatically transfer a one-time password or other authentication factor to a recipient in response to receiving a user approval.
68 Citations
20 Claims
-
1. A non-transitory computer-readable medium embodying a first application and a second application executable in at least one computing device, wherein when executed the first application and the second application cause the at least one computing device to at least:
-
determine that the first application has requested an authentication; cause a first user interface to be rendered by the second application, the first user interface eliciting a user approval of the authentication; generate a one-time password by the second application; automatically transfer the one-time password to the first application in response to receiving the user approval; cause a second user interface to be rendered by the first application, the second user interface including a first form field prepopulated with the one-time password and a second form field configured to receive a user-specified security credential; submit the user-specified security credential to a first authentication service; and submit the one-time password to a second authentication service and not directly to the first authentication service, the second authentication service acting as a proxy for the first authentication service, wherein the first authentication service is configured to perform the authentication using the one-time password received from the second authentication service and the user-specified security credential received from the at least one computing device. - View Dependent Claims (2)
-
-
3. A system, comprising:
-
at least one computing device; a first application executable in the at least one computing device, wherein when executed the first application causes the at least one computing device to at least; send an authentication request to a first authentication service, the authentication request specifying a first authentication factor; and a second application executable in the at least one computing device, wherein when executed the second application causes the at least one computing device to at least; generate a user interface on a display of the at least one computing device, the user interface facilitating entry of a user approval; and in response to receiving the user approval, send a second authentication factor to a second authentication service and not directly to the first authentication service, wherein the second authentication service operates as a proxy for the first authentication service, and the first authentication service is configured to perform an authentication in response to the authentication request using the second authentication factor received from the second authentication service and the first authentication factor received from the first application. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
determining, via at least one of one or more computing devices, that a first application has requested an authentication; causing, via at least one of the one or more computing devices, a user interface to be rendered by a second application, the user interface eliciting a user approval; receiving, via at least one of the one or more computing devices, the user approval by the second application; automatically transferring, via at least one of the one or more computing devices, a first authentication factor to a first authentication service in response to the user approval; and automatically transferring, via at least one of the one or more computing devices, a second authentication factor to a second authentication service and not to the first authentication service in response to the user approval, wherein the first authentication factor and the second authentication factor correspond to a plurality of authentication factors used to perform the authentication, the second authentication service acts as a proxy for the first authentication service, and the first authentication service is configured to perform the authentication using the second authentication factor received from the second authentication service and the first authentication factor received from the one or more computing devices. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification