Facilitation of service login
First Claim
1. A system for facilitating service login, comprising:
- a processor; and
memory comprising processor-executable instructions that when executed by the processor cause implementation of a service login management component configured to;
register a first device, comprising a first processor, as having authorization to authenticate a user for accessing a service from a second device comprising a second processor;
store device authorization information on the second device, the device authorization information specifying that the first device is registered as having authorization to authenticate the user;
receive an authorization delegation request, for a third device comprising a third processor, from the first device;
register the third device as having authorization to authenticate the user for accessing the service from the second device;
determine a first viability score of the first device corresponding to the user;
determine a second viability score of the third device corresponding to the user;
receive an access request for the service from the second device, the access request specifying a username and the device authorization information;
query an authorization database using the username to identify an encryption key and a push token;
create an encrypted request using the encryption key;
select, from amongst a plurality of devices comprising the first device and the third device, the first device as a destination for the encrypted request based upon a comparison of the first viability score and the second viability score;
responsive to the first viability score being greater than the second viability score, send the encrypted request to the first device but not the third device using the push token; and
responsive to receiving a login user authorization notification from the first device in response to the encrypted request sent to the first device, log the user into the service on the second device.
5 Assignments
0 Petitions
Accused Products
Abstract
As provided herein, a first device may be registered as authorized to authenticate a user login into a service from a second device (e.g., a smart phone may be used to log the user into a webmail service on a computer without the user having to enter a password through the computer). Responsive to the user attempting to access the service through the second device, a login interface may be displayed on the first device. The user may confirm or deny that the user wants to log into the service on the second device, thus allowing the user to seamlessly log into the service on the second device (e.g., without entering a password) while mitigating unauthorized logins into the service from unknown devices. Further, the user may use the first device to delegate the authority to authenticate the user login into the service to one or more other devices.
27 Citations
20 Claims
-
1. A system for facilitating service login, comprising:
-
a processor; and memory comprising processor-executable instructions that when executed by the processor cause implementation of a service login management component configured to; register a first device, comprising a first processor, as having authorization to authenticate a user for accessing a service from a second device comprising a second processor; store device authorization information on the second device, the device authorization information specifying that the first device is registered as having authorization to authenticate the user; receive an authorization delegation request, for a third device comprising a third processor, from the first device; register the third device as having authorization to authenticate the user for accessing the service from the second device; determine a first viability score of the first device corresponding to the user; determine a second viability score of the third device corresponding to the user; receive an access request for the service from the second device, the access request specifying a username and the device authorization information; query an authorization database using the username to identify an encryption key and a push token; create an encrypted request using the encryption key; select, from amongst a plurality of devices comprising the first device and the third device, the first device as a destination for the encrypted request based upon a comparison of the first viability score and the second viability score; responsive to the first viability score being greater than the second viability score, send the encrypted request to the first device but not the third device using the push token; and responsive to receiving a login user authorization notification from the first device in response to the encrypted request sent to the first device, log the user into the service on the second device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for facilitating service login, comprising:
a first device configured to use a processor to; register, as having authorization to authenticate a user for accessing a service from a second device comprising a second processor, with the service to obtain an encryption key, the registering comprising; obtaining a push token from a push notification service; sending an encryption key request, comprising the push token, to the service; and obtaining the encryption key from the service in response to the encryption key request sent to the service; store the encryption key and a username, of a user account with the service, within the first device; receive an encrypted request from the service; decrypt the encrypted request using the encryption key; display a login interface to the user; responsive to receiving a login user authentication notification through the login interface, provide the login user authentication notification to the service, the login user authentication notification instructing the service to log the user into the service on the second device; receive, from the service, an encrypted authorization delegation request for a third device; decrypt the encrypted authorization delegation request using the encryption key; display, based upon the decrypting, an authentication interface comprising a first option to authenticate the third device, comprising a third processor, and a second option to not authenticate the third device; and responsive to receiving a selection of the first option, delegate authorization, to the third device, for authenticating the user for accessing the service from the second device. - View Dependent Claims (12, 13)
-
11. The system of 10, the encrypted authorization delegation request received from the service and not the third device.
-
14. A method for facilitating service login, comprising:
-
registering a first device, comprising a first processor, as having authorization to authenticate a user for accessing a service from a second device comprising a second processor; registering a third device, comprising a third processor, as having authorization to authenticate the user for accessing the service from the second device; determining a first viability score of the first device corresponding to the user; determining a second viability score of the third device corresponding to the user; receiving an access request for the service from the second device, the access request specifying a username and device authorization information; querying an authorization database using the username to identify a push token; selecting, from amongst a plurality of devices comprising the first device and the third device, the first device as a destination for an encrypted request based upon a comparison of the first viability score and the second viability score; sending the encrypted request to the first device using the push token; and responsive to receiving a login user authorization notification from the first device in response to the encrypted request sent to the first device, logging the user into the service on the second device. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification