The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 10, 2017

Filed:

May. 22, 2009
Applicants:

Yordan I. Rouskov, Kirkland, WA (US);

Wei-qiang Michael Guo, Bellevue, WA (US);

Orville Charles Mcdonald, Seattle, WA (US);

Ramu Movva, Redmond, WA (US);

Kyle Stapley Young, Duvall, WA (US);

Kok Wai Chan, Bellevue, WA (US);

Inventors:

Yordan I. Rouskov, Kirkland, WA (US);

Wei-Qiang Michael Guo, Bellevue, WA (US);

Orville Charles McDonald, Seattle, WA (US);

Ramu Movva, Redmond, WA (US);

Kyle Stapley Young, Duvall, WA (US);

Kok Wai Chan, Bellevue, WA (US);

Assignee:
Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/00 (2013.01); H04L 9/32 (2006.01); G06F 21/42 (2013.01); H04W 12/06 (2009.01);
U.S. Cl.
CPC ...
H04L 9/3234 (2013.01); G06F 21/42 (2013.01); H04L 9/3228 (2013.01); H04L 9/3271 (2013.01); H04L 2209/80 (2013.01); H04W 12/06 (2013.01);
Abstract

Authentication is widely used to protect consumer data and computing services, such as email, document storage, and online banking. Current authentication models, such as those employed by online identity providers, may have limited options and configurations for authentication schemes. Accordingly, as provided herein, a model based authentication scheme may be configured based upon a policy and/or an authentication mechanism list. The policy may define the target resource, a user, a group the user belongs to, devices used to connect to the target resource, a service owning the target resource, etc. The authentication mechanism list may comprise predefined authentication mechanisms and/or user plug-in authentication mechanisms (e.g., user created authentication mechanism). Once the authentication scheme is configured, it may be enforced upon authentication requests from a user. Feedback may be provided to the user based upon patterns of usage of the target resource.


Find Patent Forward Citations

Loading…