Certains contenus de cette application ne sont pas disponibles pour le moment.
Si cette situation persiste, veuillez nous contacter àObservations et contact
1. (WO2017003651) SYSTÈMES ET PROCÉDÉS D’AUTHENTIFICATION ANONYME À L’AIDE DE MULTIPLES DISPOSITIFS
Note: Texte fondé sur des processus automatiques de reconnaissance optique de caractères. Seule la version PDF a une valeur juridique

What is claimed is:

1 , A method of authentication using at. least two user devices of an associated set of user devices, the method comprising:

registering each user device of an associated set of user devices with an authenticator computing device, wherein each of the user devices of the associated set of user devices are registered to at least one user;

receiving, at the authenticator computing device, a request to access a resource from one user device of the associated set of user devices, wherein the one user device requesting access to the resource is registered to more than one user:

generating an authentication challenge at the authenticator computing device in response to the request;

transmitting the authentication challenge to one user device of a subset of user devices of the associated set of user devices registered with the authenticator computing device, wherein the subset of user devices comprises at least one user device other than the one user device requesting access to the resource;

transmitting the authentication challenge from the one user device of the subset of user devices to one or more other user devices of the subset of user devices;

generating at least one response to the authentication challenge at one or more user devices of the subset of user devices;

transmitting the at least one response to the authenticator computing device;

determining, at the authenticator computing device, if the at least one response constitutes a valid response to the authentication challenge; and

granting any one or more of the user devices of the associated set of user devices registered with the authenticator computing device access to the resource if the at least one response received at the authenticator computing device constitutes a valid response to the authentication challenge,

2. The method of claim 1 , wherein registering each of the user devices of the associated set of user devices with an authenticator computing device, wherein each of the user devices of the associated set of user devices are registered to at least one user, further comprises storing at. least one user credential and storing at least one verified device identifier from each of the user devices of the associated set of user devices at the authenticator computing device.

3 , The method of claim 1 , wherein transmitting the authentication challenge to a subset of user devices of the associated set of user devices further comprises, transmitting the authentication challenge from the authenticator computing device to the subset of user devices according to a forwarding policy of the authenticator computing device.

4. The method of claim 1 , wherein transmitting the authentication challenge to a subset of user devices of the associated set of user devices further comprises, transmitting the authentication challenge from the authenticator computing device to the user device requesting access to the resource and the user device requesting access to the resource subsequently transmitting the authentication challenge to the other user devices of the subset of user devices according to a forwarding policy of the user device requesting access to the resource.

5. The method of claim 1 , wherein generating at least one response to the authentication challenge at one or more user devices of the subset of user devices further comprises, generating a response to the authentication challenge at each of the user devices of the subset of user devices according to a response policy of each of the user devices of the subset of user devices.

6. The method of claim 5 further comprising, transmitting the response to the authentication challenge generated at each of the user devices of the subset of user devices to the authenticator computing device.

7. The method of claim 6, wherein determining, at the authenticator computing device, if the at least one response constitutes a valid response to the authentication challenge further comprises, determining if each response to the authentication challenge generated at each of the users devices of the subset of user devices constitutes a valid response.

8, The method of claim 6, wherein determining, at the authenticator computing device, if the at least one response constitutes a valid response to the authentication challenge further comprises, determining if each response to the authentication challenge generated at each of user devices of the subset of user devices constitutes a valid response according to a validation policy of the authenticator computing device.

9. The method of claim 1 , wherein the authentication challenge is an encrypted or cryptographicaliy signed authentication challenge.

10. The method of claim 1 , wherein the authentication challenge comprises a Message Authentication Code (MAC).

1 1. The method of claim 1 , wherein the authentication challenge comprises a timestamp.

12. The method of claim 1 , wherein a transmission technique for the authentication challenge is selected from the group consisting of a QR code, a sound wave, a light wave, an infrared signal, an NFC, a Bluetooth signal, a radio signal, an image, a state of a memory device and a vibration.

13. The method of claim 1 , wherein the resource is selected from the group consisting of an application, a file, a process, a port, a service, a network bandwidth, a device, a memory and a processor time.

14. One or more non-transitory computer-readable media having computer-executable instructions for performing a method of running a software program on a computing device, the method including issuing instructions from the software program, the instructions comprising:

registering each user device of an associated set of user devices with an authenticator computing device, wherein each of the user devices of the associated set of user devices are registered to at least one user;

receiving, at the authenticator computing device, a request to access a resource from one user device of the associated set of user devices, wherein the one user device requesting access to the resource is registered to more than one user;

generating an authentication challenge at the authenticator computing device in response to the request;

transmitting the authentication challenge to one user device of a subset of user devices of the associated set of user devices registered with the authenticator computing device, wherein the subset of user devices comprises at least one user device other than the one user device requesting access to the resource;

transmitting the authentication challenge from the one user device of the subset of user devices to one or more other user devices of the subset of user devices;

generating at least one response to the authentication challenge at one or more user devices of the subset of user devices;

transmitting the at least one response to the authenticator computing device;

determining, at the authenticator computing device, if the at least one response constitutes a valid response to the authentication challenge; and

granting any one or more of the user devices of the associated set of user devices registered with the authenticator computing device access to the resource if the at least one response received at the authenticator computing device constitutes a valid response to the authentication challenge.

15. The media of claim 14, further comprising instructions for registering each of the user devices of the associated set of user devices to a user with an authenticator computing device, wherein each of the user devices of the associated set of user devices are registered to at least one user, by storing at least one user credential and storing at least one verified device identifier from each of the user devices of the associated set of user devices at the authenticator computing device.

16. The media of claim 14, further comprising instructions for transmitting the authentication challenge from the authenticator computing device to the subset of user devices according to a forwarding policy of the authenticator computing device.

17. The media of claim 14, further comprising instructions for transmitting the authentication challenge from the authenticator computing device to the user device requesting access to the resource and subsequently transmitting the authentication challenge from the user device requesting access to the resource to the other user devices of the subset of user devices according to a forwarding policy of the user device requesting access to the resource.

18. The media of claim 14, further comprising instructions for generating a response to the authentication challenge at each of the user devices of the subset of user devices according to a response policy of each of the user devices of the subset of user devices.

19. The media of claim 18, further comprising instructions for transmitting the response to the authentication challenge generated at each of the user devices of the subset of user devices to the authenticator computing device.

20. The media of claim 19, further comprising instructions for determining if each response to the authentication challenge generated at each of the users devices of the subset of user devices constitutes a valid response.

21. The media of claim 19, further comprising instructions for determining if each response to the authentication challenge generated at each of user devices of the subset of user devices constitutes a valid response according to a validation policy of the authenticator computing device.

22. The media of claim 14, wherein the authentication challenge is an encrypted or cryptographically signed authentication challenge.

23. The media of claim 14, wherein the authentication challenge comprises a Message Authentication Code (MAC).

24. The media of claim 14, wherein the authentication challenge comprises a timestamp.

25. The media of claim 14, wherein a transmission technique for the authentication challenge is selected from the group consisting of a QR code, a sound wave, a light wave, an infrared signal, an NFC, a Bluetooth signal, a radio signal, an image, a state of a memory device and a vibration.

26. The media of claim 14, wherein the resource is seiected from the group consisting of an application, a file, a process, a port, a service, a network bandwidth, a device, a memory and a processor time.

27. An authentication system comprising:

an authenticates computing device configured to register each user device of an associated set of user devices with the authenticator computing device, wherein each of the user devices of the associated set of user devices are registered to at least one user, the authenticator computing device further configured to receive a request to access a resource from one user device of a the associated set of user devices, wherein the one user device requesting access to the resource is registered to at least two users and with the authenticator computing device, to generate an authentication challenge in response to the request, to transmit the authentication challenge to one user device of a subset of user devices of the associated set of user devices registered with the authenticator computing device and to transmit the authentication challenge from the one user device of the subset of user devices to one or more other devices of the subset of user devices, wherein the subset of user devices comprises at least one device other than the one user device requesting access to the resource or to transmit the authentication challenge to the user device requesting access to a resource for subsequent transmission of the authentication challenge from the user device requesting access to a resource to the other user device(s) of the subset, to receive at least one response to the authentication challenge from one or more user devices of the subset of user devices, to determine if the at least one response constitutes a valid response to the authentication challenge and to grant any one or more of the user devices of the associated set of user devices registered with the authenticator computing device access to the resource if the at least one response received constitutes a valid response to the authentication challenge.

28. The authentication system of claim 27, wherein the authenticator computing device is further configured to register each of the associated set of user devices with the authenticator computing device by storing at least one user credential and ste R§ at least one verified device identifier from each of the user devices of the associated set of user devices at the authenticator computing device,

29. The authentication system of claim 27, wherein the associated set of user devices are selected from the group consisting of a laptop computer, a personal digital assistant, a cellular telephone, a smart phone, a smart watch, a smart ring, a smart wearable device, a smart lock, a music player, a web pads, a tablet computer system, a game device, an electronic book reader, or other device with like capability.