The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jan. 10, 2017
Filed:
May. 22, 2009
Yordan I. Rouskov, Kirkland, WA (US);
Wei-qiang Michael Guo, Bellevue, WA (US);
Orville Charles Mcdonald, Seattle, WA (US);
Ramu Movva, Redmond, WA (US);
Kyle Stapley Young, Duvall, WA (US);
Kok Wai Chan, Bellevue, WA (US);
Yordan I. Rouskov, Kirkland, WA (US);
Wei-Qiang Michael Guo, Bellevue, WA (US);
Orville Charles McDonald, Seattle, WA (US);
Ramu Movva, Redmond, WA (US);
Kyle Stapley Young, Duvall, WA (US);
Kok Wai Chan, Bellevue, WA (US);
Microsoft Technology Licensing, LLC, Redmond, WA (US);
Abstract
Authentication is widely used to protect consumer data and computing services, such as email, document storage, and online banking. Current authentication models, such as those employed by online identity providers, may have limited options and configurations for authentication schemes. Accordingly, as provided herein, a model based authentication scheme may be configured based upon a policy and/or an authentication mechanism list. The policy may define the target resource, a user, a group the user belongs to, devices used to connect to the target resource, a service owning the target resource, etc. The authentication mechanism list may comprise predefined authentication mechanisms and/or user plug-in authentication mechanisms (e.g., user created authentication mechanism). Once the authentication scheme is configured, it may be enforced upon authentication requests from a user. Feedback may be provided to the user based upon patterns of usage of the target resource.