System and method for service assisted mobile pairing of password-less computer login

A computer and password technology, applied in computer parts, computing, transmission systems, etc., can solve the problems of waste of time and computing resources, cumbersome login without password, etc.

Active Publication Date: 2018-11-09
CA TECH INC
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, BLE dongles make passwordless login more cumbersome as it is just another waste of time and computing resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for service assisted mobile pairing of password-less computer login
  • System and method for service assisted mobile pairing of password-less computer login
  • System and method for service assisted mobile pairing of password-less computer login

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following embodiments describe a data communication system and method for securely pairing a mobile device with a computer for passwordless login using a web service. It will be apparent to those skilled in the art that the embodiment may be practiced without some or all of these specific details. In other instances, well known process operations have not been described in detail in order not to unnecessarily obscure the implementations.

[0021] Systems and methods for data communication may include sending a pairing request from a computing device to a network server, where the pairing request includes computer authentication data and a computer public key. The method can also include pairing the mobile device with the computing device using the web server in response to the pairing request. For example, during device pairing, the computing device may generate a pairing secret key and an associated QR image, and the user is prompted to scan the image using the mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method for pairing a mobile device with a computer for password-less login using a network service is provided. The method may include sending a pairing request to a network server from acomputing device, wherein the pairing request includes computer authentication data and a computer public key. The network server may pair the mobile device with the computing device; wherein, the computing device may generate a pairing secret key and an associated QR image, which the user is prompted to scan using the mobile device. A pairing agent within the mobile device may validate the computer authentication data and parse the computer public key therefrom. In some embodiments a PIN could be displayed by the computer and entered by the user into the mobile device or silently exchanged between the computer and the mobile device, when proximate to each other, for the mutual authentication data validation. The method may further include registering the user mobile and computer devicesfor administrative management at the network server for an enterprise deployment or end user self-service management.

Description

Background technique [0001] Authenticating users on computing devices using passwords and usernames generally poses some level of difficulty for most individuals given the increased computer network requirements regarding passwords and user privileges. For example, a user may have various accounts on various different computing devices, all with different usernames and passwords that require a combination of alphanumeric and special characters. Specifically, each account may require a password to have a certain number of characters, including numbers, letters, and special characters. All these passwords and usernames require the user to remember and recall too much data. Additionally, using passwords during login attempts can be a security concern when there is malicious code on the machine with keystroke tracking capabilities. Some users may be lured into downloading this malicious code, which makes password-based authentication vulnerable to hacking. Additionally, email p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30G06K19/06
CPCG06F21/34G09C5/00H04L9/0822H04L9/14H04L9/3226H04L63/0435H04L63/083H04L63/0838H04L63/0853H04L2209/80H04L2463/062H04W12/06H04W12/50H04W12/77H04L9/0894H04L9/3228H04L9/3234H04L63/0428H04L63/061H04W12/04
Inventor M·裴S·加特塔尼R·J·安东尼拉杰
Owner CA TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products