Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for performing preferential generation of second factor authentication

A two-factor authentication and factor technology, applied in the field of implementing priority generation second-factor authentication and systems, can solve problems such as service loss, time-consuming, difficult retrieval and keying processes, etc.

Active Publication Date: 2022-03-11
GOOGLE LLC
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The 2FA workflow can be cumbersome for the user, and because the process of retrieving and typing the 2FA code is difficult and time-consuming, services often lose a large number of users who do not log in to the promoted app after installation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for performing preferential generation of second factor authentication
  • Method and system for performing preferential generation of second factor authentication
  • Method and system for performing preferential generation of second factor authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Terms associated with this disclosure include:

[0032] The singular forms "a", "an" and "the" include plural forms unless expressly stated otherwise. Likewise, the term "comprising" (or "comprise") means "including (or including) but not limited to". The relative terms "long" and "short" are intended as relative measurements relative to each other, since the measurement of an item named "long" will be relatively longer than the measurement of the corresponding item named "short". Unless defined otherwise, all technical and scientific terms used in this document have the same meaning as commonly understood by one of ordinary skill in the art.

[0033] An "application" refers to a program configured to notify a client device to perform one or more tasks.

[0034]An "electronic device" or "computing device" refers to a device that includes a processor and memory. Each device may have its own processor and / or memory, or the processor and / or memory may be shared with oth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method includes prompting, via a first application installed on the client electronic device, a user to install a second application on the client electronic device, and prompting, via the first application, the user to authorize priority login to the Second application. Responsive to receiving an indication from the user to install the second application and receiving an indication from the user to authorize priority login to the second application, installing the second application and generating an Two-factor authentication code in two apps. The method includes sending a message to the second application, launching the second application, and automatically logging the user into the second application without requiring the user to provide the two-factor authentication code or any other form of authentication. Second factor authentication.

Description

[0001] Cross References to Related Applications [0002] This application is a continuation of US Patent Application No. 15 / 715,815 filed September 26, 2017, the disclosure of which is incorporated herein by reference. Background technique [0003] Many services running on or otherwise accessible by electronic devices require users to enter a two-factor authentication (2FA) code or other second-factor authentication token. [0004] Two-factor authentication is a security feature that requires a user to provide a 2FA code or token in addition to single-factor authentication credentials (such as, for example, a username and password) in order to access resources. Two-factor authentication may be used in certain scenarios, such as when a user attempts to access resources from, on a new device, from an unknown Internet Protocol address, or in other unknown circumstances. [0005] In these scenarios, the 2FA code is sent to the user in a secure manner. For example, the 2FA code m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04W12/06G06F21/41
CPCH04L63/108H04L2463/082G06F21/41H04L63/0815G06F21/40H04L63/0884
Inventor 贾斯汀·刘易斯托马斯·普赖斯
Owner GOOGLE LLC