×

Multi-device authentication

  • US 9,939,908 B2
  • Filed: 09/28/2015
  • Issued: 04/10/2018
  • Est. Priority Date: 09/28/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for security and authentication of a user based on network communications, the method comprising the steps of:

  • establishing a communication channel between a first device and a second device, wherein the establishing of the communication channel is performed in response to detecting a physical or an electrical coupling between the first device and the second device;

    receiving, via the communication channel and from one or more sensors of the first device, sensor data indicating that a first gesture has been performed with at least the first device, the received sensor data including one or more of;

    a distance traveled by the first device to perform the first gesture, a speed of the first device to perform the first gesture, an acceleration of the first device to perform the first gesture, a pressure experienced by the first device to perform the first gesture, or a time duration of the first gesture;

    comparing the received sensor data with stored sensor data that indicates a performance of a second gesture, the stored sensor data being stored on the second device;

    determining, based on the comparing, whether the first gesture matches the second gesture;

    receiving, through the communication channel and in response to a determination that the first gesture matches the second gesture, a first authentication credential from the first device;

    comparing the first authentication credential with a second authentication credential that is stored on the second device, wherein the first authentication credential or the second authentication credential includes a user identifier for accessing an account; and

    accessing the account via at least one of;

    the first authentication credential or the second authentication credential;

    wherein;

    the second device stores the first authentication credential until a predetermined amount of time is reached; and

    the second device deletes the first authentication credential from the second device after a threshold time has elapsed or after the account has been accessed.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×