Method for authenticating a device
First Claim
1. A method for authenticating a first device, the method being executed by a second device, the second device comprising a database, the database storing a profile associated to a user of the first device, the method comprising:
- receiving a request for authentication from the first device;
upon reception of the request for authentication, using the profile of the user to generate and send to the first device a first challenge comprising a question about a characteristic of the first device and a corresponding response for authentication of the first device; and
authenticating the first device using the first challenge based on a response to the first challenge issued by the first device independent of user input, wherein a successful authentication of the first device using the first challenge triggers;
immediately collecting contextual information from the first device, the contextual information including information that uniquely identifies the first device; and
updating the profile associated to the user of the first device with the collected contextual information for a subsequent generation of a second challenge including a second question about another characteristic of the first device for authentication of the first device.
1 Assignment
0 Petitions
Accused Products
Abstract
Present system relates to a method for authenticating a first device, the method being executed by a second device, the second device comprising a database, the database storing a profile associated to a user of the first device, the second device using the profile of the user to generate a first challenge comprising a question and a corresponding response for authentication of the first device, the method comprising, upon successful authentication of the first device using the first challenge, the steps of collecting contextual information from the first device and updating the profile associated to the user of the first device with the received contextual information for a subsequent generation of a second challenge for authentication of the first device.
24 Citations
18 Claims
-
1. A method for authenticating a first device, the method being executed by a second device, the second device comprising a database, the database storing a profile associated to a user of the first device, the method comprising:
-
receiving a request for authentication from the first device; upon reception of the request for authentication, using the profile of the user to generate and send to the first device a first challenge comprising a question about a characteristic of the first device and a corresponding response for authentication of the first device; and authenticating the first device using the first challenge based on a response to the first challenge issued by the first device independent of user input, wherein a successful authentication of the first device using the first challenge triggers; immediately collecting contextual information from the first device, the contextual information including information that uniquely identifies the first device; and updating the profile associated to the user of the first device with the collected contextual information for a subsequent generation of a second challenge including a second question about another characteristic of the first device for authentication of the first device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A server comprising a non-transitory computer readable medium, the medium storing a profile associated to a user of a first device, the server being adapted for:
-
receiving a request for authentication from the first device; upon reception of the request for authentication, using the profile of the user to generate and to send to the first device a first challenge comprising a question about a characteristic of the first device and a corresponding response for authentication of the first device; and authenticating the first device using the first challenge based on a response to the first challenge issued by the first device independent of user input, wherein a successful authentication of the first device using the first challenge triggers; immediately collecting contextual information from the first device, the contextual information including information that uniquely identifies the first device; and updating the profile associated to the user of the first device with the collected contextual information for a subsequent generation of a second challenge including a second question about another characteristic of the first device for authentication of the first device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An application program embodied on a non-transitory computer readable medium and arranged to execute a method for authenticating a first device, the method being executed by a second device, the second device comprising a database, the database storing a profile associated to a user of the first device, the method comprising:
-
receiving a request for authentication from the first device; upon reception of the request for authentication, using the profile of the user to generate and send to the first device a first challenge comprising a question about a characteristic of the first device and a corresponding response for authentication of the first device; and authenticating the first device using the first challenge based on a response to the first challenge issued by the first device independent of user input, wherein a successful authentication of the first device using the first challenge triggers; immediately collecting contextual information from the first device, the contextual information including information that uniquely identifies the first device; and updating the profile associated to the user of the first device with the collected contextual information for a subsequent generation of a second challenge including a second question about another characteristic of the first device for authentication of the first device. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification