Efficient logon
First Claim
Patent Images
1. A method comprising:
- detecting a first device associated with a user within a detectable range of a second device;
requesting authentication information based on an authentication challenge indicated in a user profile associated with the first device;
receiving the authentication information;
in response to receiving the authentication information, installing a token generator on the second device;
generating, by the token generator associated with the user, a secure token, wherein the token generator is stored on the second device;
sending, to a server, the secure token and a time stamp associated with the secure token; and
granting, to the user, access to one or more services in response to receiving a verification of the secure token.
1 Assignment
0 Petitions
Accused Products
Abstract
The technology described herein detects a first device associated with a user that is within a detectable range of a second device. The system requests authentication information. In response to receiving the authentication information, a token generator associated with the user can generate a secure token. The secure token can be sent to the server. Once the secure token is verified, the user is granted access to one or more services.
82 Citations
18 Claims
-
1. A method comprising:
-
detecting a first device associated with a user within a detectable range of a second device; requesting authentication information based on an authentication challenge indicated in a user profile associated with the first device; receiving the authentication information; in response to receiving the authentication information, installing a token generator on the second device; generating, by the token generator associated with the user, a secure token, wherein the token generator is stored on the second device; sending, to a server, the secure token and a time stamp associated with the secure token; and granting, to the user, access to one or more services in response to receiving a verification of the secure token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable storage medium containing a set of instructions that, when executed by one or more processors, cause a machine to:
-
detect a first device associated with a user within a detectable range of a second device; request authentication information based on an authentication challenge indicated in a user profile associated with the first device; receive the authentication information; in response to receiving the authentication information, install a token generator on the second device; generate, by the token generator associated with the user, a secure token, wherein the token generator is stored on the second device; send, to a server, the secure token and a time stamp associated with the secure token; and grant, to the user, access to one or more services in response to receiving a verification of the secure token. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system comprising:
-
a memory; a processor in communication with the memory, the processor operable to execute software modules, the software modules comprising; a detection module configured to; detect a first device associated with a user within a detectable range of a second device; an authentication request module configured to; request authentication information based on an authentication challenge indicated in a user profile associated with the first device, receive the authentication information, in response to receiving the authentication information, installing a token generator on the second device; generate, by the token generator associated with the user, a secure token, wherein the token generator is stored on the second device, send, to a server, the secure token and a time stamp associated with the secure token; and a logon module configured to; grant, to the user, access to one or more services in response to receiving a verification of the secure token. - View Dependent Claims (17, 18)
-
Specification