Secure mobile initiated authentications to web-services

Active Publication Date: 2021-02-11
HYPR CORP
View PDF0 Cites 64 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0015]Some aspects include a tangible, non-transitory, machine-readable medium storing instructions that when executed by a data processing apparatus cause the data processing apparatus to perform operations of one or more of the above-mentioned processes and computer-implement

Problems solved by technology

In this manner, such systems may supply additional factors by which additional confidence may be obtained regarding a user's identity, as merely compromising a user's username and password would not by itself afford access to secured resources.
These and other existing techniques impose friction on users and are potentially subject to vulnerabilities.
In the aggregate, these repeated requests can be frustrating and, in some cases, expand the attack surface of a user's identity wi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure mobile initiated authentications to web-services
  • Secure mobile initiated authentications to web-services
  • Secure mobile initiated authentications to web-services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032]To mitigate the problems described herein, the inventors had to both invent solutions and, in some cases just as importantly, recognize problems overlooked (or not yet foreseen) by others in the field of cybersecurity. Indeed, the inventors wish to emphasize the difficulty of recognizing those problems that are nascent and will become much more apparent in the future should trends in industry continue as the inventors expect. Further, because multiple problems are addressed, it should be understood that some embodiments are problem-specific, and not all embodiments address every problem with traditional systems described herein or provide every benefit described herein. That said, improvements that solve various permutations of these problems are described below.

[0033]Existing federated identity management techniques impose more friction on users and require more trust of developers than is desirable. Often, in single computing session, a user is asked to login to several diff...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a process for mobile-initiated authentications to web services. Credential values of the user are established within a trusted execution environment of the mobile device and representations are transmitted to a server. The user of the mobile device may authenticate with the mobile device to the server, which may convey access to a web-based service from a relying device. The server may pass credentials corresponding to the web-service received from the mobile device and verified to permit user access to the web-service to the relying device. The relying device presents credentials to the web-service to login, authenticate, or otherwise obtain user-level permission for the user on the relying device. The user of the mobile device may authenticate with the mobile device to the server, and may initiate the authentication process from the mobile device, without inputting credentials corresponding to the web-service on the relying device.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]The present application is a continuation-in-part of U.S. patent application Ser. No. 16 / 932,605, filed on 17 Jul. 2020, titled SECURE MOBILE INITIATED AUTHENTICATION, which is a continuation of U.S. Pat. No. 10,764,752, filed on 13 May 2020, titled SECURE MOBILE INITIATED AUTHENTICATION, which claims the benefit of U.S. Provisional Patent Application 62 / 951,945, filed on 20 Dec. 2019, titled SECURE MOBILE INITIATED AUTHENTICATION, and U.S. Pat. No. 10,764,752 is a continuation-in-part of U.S. patent application Ser. No. 16 / 373,561, filed on 2 Apr. 2019, titled FEDERATED IDENTITY MANAGEMENT WITH DECENTRALIZED COMPUTING PLATFORMS, which is a continuation-in-part of U.S. Pat. No. 10,601,828, filed on 7 Feb. 2019, titled OUT-OF-BAND AUTHENTICATION BASED ON SECURE CHANNEL TO TRUSTED EXECUTION ENVIRONMENT ON CLIENT DEVICE, which claims the benefit of U.S. Provisional Patent Application 62 / 720,609 filed on 21 Aug. 2018, titled OUT-OF-BAND AUTHE...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04L29/06G06F21/45H04W12/08
CPCH04W12/0608H04L63/083H04L63/0884G06F21/45G06F2221/2149H04L63/20H04L63/062H04W12/08H04W12/0609H04L63/18G06F21/33H04W12/069H04L63/0815H04W12/108G06F21/64H04W12/37H04W12/60H04L2209/80H04L9/3247H04L9/3239H04L9/3218H04L9/3263H04L9/321H04L9/0897H04L9/50H04W12/068
Inventor AVETISOV, GEORGEKADINSKY, ROMANSIMIC, BOJAN
Owner HYPR CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products