Two-factor authentication

A technology of two-factor authentication and device authentication, applied in the field of reverse two-factor authentication system, can solve problems such as user troubles, and achieve the effect of reducing troublesome nature

Active Publication Date: 2018-12-21
MICROSOFT TECH LICENSING LLC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although more secure than single-factor authentication, the above process is cumbersome for users, especially those with physical disabilities who find it difficult to manually enter text messages
Furthermore, the above process requires extensive manual user intervention whenever a user attempts to authenticate to a service or application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor authentication
  • Two-factor authentication
  • Two-factor authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The technology of the application is described in detail herein to satisfy statutory requirements. However, the description itself is not intended to limit the scope of this patent application. Rather, the inventors have contemplated that the claimed subject matter may also be implemented in other ways, to include steps other than those described in this document, or combinations of similar steps, in connection with other present or future technologies. Furthermore, although the terms "step" and / or "block" may be used herein to refer to various elements of a method employed, these terms should not be construed as implying a sequence of steps unless and unless an order for the various steps is explicitly described Any particular order among or between the various steps disclosed herein.

[0015] Various aspects of the technology described herein relate generally to systems, methods, and computer-readable storage media for authenticating users to services or applications...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Systems, methods, and computer-readable storage media are provided for authenticating users to secure services or apps utilizing reversed hands-free and / or continuous two-factor authentication. When auser desires to access a secure service or app for which she / he is already registered, the user, having a registered mobile computing device in proximity to his or her presence, comes within a threshold distance of a computing device that includes the desired secure service or app. The computing device authenticates the particular mobile computing device as associated with the particular registered user that utilized that mobile device during registration. Subsequent to such device authentication, the user is able to login to the service or app by simply providing his or her user credentialsat a login form associated therewith. Two-factor authentication in accordance with embodiments hereof is more secure and more efficient than traditional authentication methodologies.

Description

Background technique [0001] When a user desires to access a secure service or application (eg, via a website or application), he / she often needs to register with the service or application. During registration, the user selects, creates, or is otherwise provided with one or more user credentials that identify the user. When accessing a service or application sometime after initial registration, a user authenticates to the service or application by providing user credentials that verify his / her identity. This type of registration is often referred to as single-factor authentication because the user is required to utilize a single factor—"something the user knows" (i.e., a password chosen, created, or otherwise provided at registration)—to authenticate the service to the service. or apply authentication. [0002] While single-factor authentication is sufficient for some purposes, a fraudulent user employing a little creativity and user knowledge may be able to guess user crede...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06H04W12/08H04W4/50H04W4/80
CPCH04L63/107H04L2463/082H04L63/0853H04W12/08H04W4/50H04W4/80H04W12/40H04W12/065H04W12/64H04L63/10H04W12/06
Inventor H·施泰恩加特A·N·戈唐J·加兹特
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products