-
公开(公告)号:US11552798B2
公开(公告)日:2023-01-10
申请号:US16526384
申请日:2019-07-30
Applicant: Google LLC
Inventor: Vadim Sukhomlinov , Alberto Martin , Andrey Pronin
IPC: H04L9/32
Abstract: A method for authenticating a secure credential transfer to a device includes verifying user identity and device identity. In particular, the method includes verifying user identity by requesting and receiving a user identification input at a first client device and verifying device identity of a second client device by (i) determining a security status of the second client device from hardware of the second client device, (ii) invoking an identifier related to the security status of the second client device to an authentication server, and (iii) obtaining certification from the authentication server for the second client device based on the invoked identifier. After verifying the user identity and the device identity, the method includes establishing a secure channel between the first client device and the second client device for the secure credential transfer using one or more tokens generated by the authentication server.
-
公开(公告)号:US12041174B2
公开(公告)日:2024-07-16
申请号:US18080084
申请日:2022-12-13
Applicant: Google LLC
Inventor: Vadim Sukhomlinov , Alberto Martin , Andrey Pronin
IPC: H04L9/32
CPC classification number: H04L9/3234 , H04L9/3213 , H04L9/3263
Abstract: A method for authenticating a secure credential transfer to a device includes verifying user identity and device identity. In particular, the method includes verifying user identity by requesting and receiving a user identification input at a first client device and verifying device identity of a second client device by (i) determining a security status of the second client device from hardware of the second client device, (ii) invoking an identifier related to the security status of the second client device to an authentication server, and (iii) obtaining certification from the authentication server for the second client device based on the invoked identifier. After verifying the user identity and the device identity, the method includes establishing a secure channel between the first client device and the second client device for the secure credential transfer using one or more tokens generated by the authentication server.
-
3.
公开(公告)号:US20200034019A1
公开(公告)日:2020-01-30
申请号:US16592129
申请日:2019-10-03
Applicant: Google LLC
Inventor: Alberto Martin , Katie Leah Roberts-Hoffman , Alexander Friedrich Kuscher , Benjamin Goldsmith
IPC: G06F3/0489 , G06F1/16 , G06F3/0354 , G06F9/451 , G06F3/023 , G06F3/0488 , G06F17/24 , G06F17/27
Abstract: A computing device may include one or more dynamically configurable user input devices. In one example, a triggering event, such as, for example, a user input at a user interface of the computing device, may be detected in connection with an application running on the computing device. In response to the detected triggering event, individual elements of the user interface, such as, for example, keys of a keyboard, may be configured, and/or re-configured, to correspond to the input received and/or the application running on the computing device.
-
公开(公告)号:US20240333514A1
公开(公告)日:2024-10-03
申请号:US18738179
申请日:2024-06-10
Applicant: Google LLC
Inventor: Vadim Sukhomlinov , Alberto Martin , Andrey Pronin
IPC: H04L9/32
CPC classification number: H04L9/3234 , H04L9/3213 , H04L9/3263
Abstract: A method for authenticating a secure credential transfer to a device includes verifying user identity and device identity. In particular, the method includes verifying user identity by requesting and receiving a user identification input at a first client device and verifying device identity of a second client device by (i) determining a security status of the second client device from hardware of the second client device, (ii) invoking an identifier related to the security status of the second client device to an authentication server, and (iii) obtaining certification from the authentication server for the second client device based on the invoked identifier. After verifying the user identity and the device identity, the method includes establishing a secure channel between the first client device and the second client device for the secure credential transfer using one or more tokens generated by the authentication server.
-
公开(公告)号:US11010052B2
公开(公告)日:2021-05-18
申请号:US16592129
申请日:2019-10-03
Applicant: Google LLC
Inventor: Alberto Martin , Katie Leah Roberts-Hoffman , Alexander Friedrich Kuscher , Benjamin Goldsmith
IPC: G06F3/048 , G06F3/0489 , G06F9/451 , G06F1/16 , G06F3/0354 , G06F40/171 , G06F40/221 , G06F3/023 , G06F3/0488
Abstract: A computing device may include one or more dynamically configurable user input devices. In one example, a triggering event, such as, for example, a user input at a user interface of the computing device, may be detected in connection with an application running on the computing device. In response to the detected triggering event, individual elements of the user interface, such as, for example, keys of a keyboard, may be configured, and/or re-configured, to correspond to the input received and/or the application running on the computing device.
-
公开(公告)号:US20210036859A1
公开(公告)日:2021-02-04
申请号:US16526384
申请日:2019-07-30
Applicant: Google LLC
Inventor: Vadim Sukhomlinov , Alberto Martin , Andrey Pronin
IPC: H04L9/32
Abstract: A method for authenticating a secure credential transfer to a device includes verifying user identity and device identity. In particular, the method includes verifying user identity by requesting and receiving a user identification input at a first client device and verifying device identity of a second client device by (i) determining a security status of the second client device from hardware of the second client device, (ii) invoking an identifier related to the security status of the second client device to an authentication server, and (iii) obtaining certification from the authentication server for the second client device based on the invoked identifier. After verifying the user identity and the device identity, the method includes establishing a secure channel between the first client device and the second client device for the secure credential transfer using one or more tokens generated by the authentication server.
-
-
-
-
-