18065040. Trusted Mobile Endpoints Using Webview simplified abstract (Cisco Technology, Inc.)
Contents
- 1 Trusted Mobile Endpoints Using Webview
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 Trusted Mobile Endpoints Using Webview - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Key Features and Innovation
- 1.6 Potential Applications
- 1.7 Problems Solved
- 1.8 Benefits
- 1.9 Commercial Applications
- 1.10 Prior Art
- 1.11 Frequently Updated Research
- 1.12 Questions about Authentication Technology
- 1.13 Original Abstract Submitted
Trusted Mobile Endpoints Using Webview
Organization Name
Inventor(s)
Harold Todd Chapman of Howell MI (US)
Robert Jacob Linial Small of Ann Arbor MI (US)
Michael G. Brown of Portland OR (US)
Adam Vincent Patruno of Canton MI (US)
Dylan Miles Kite of Ann Arbor MI (US)
Zachary Oliver Weglarz of Ann Arbor MI (US)
Erdenebat Gantumur of Ann Arbor MI (US)
Trusted Mobile Endpoints Using Webview - A simplified explanation of the abstract
This abstract first appeared for US patent application 18065040 titled 'Trusted Mobile Endpoints Using Webview
Simplified Explanation
The patent application describes a method where an authentication server generates a transaction identifier for an authentication request from an external device. Upon verifying the first authentication factor, the server sends a prompt and the transaction identifier to the device. The device processes the HTTP link associated with the prompt, which opens a browser with a generated cookie. The server then verifies the transmitted transaction identifier and the generated cookie to authenticate the request.
- The method involves generating a transaction identifier for authentication requests.
- A prompt and transaction identifier are sent to the external device after verifying the first authentication factor.
- The device processes an HTTP link associated with the prompt, opening a browser with a generated cookie.
- The server verifies the transmitted transaction identifier and the generated cookie for authentication.
Key Features and Innovation
- Generation of transaction identifiers for authentication requests.
- Use of prompts and cookies to authenticate requests.
- Integration of browser and webview for processing authentication.
Potential Applications
This technology can be applied in various industries such as finance, healthcare, and e-commerce for secure user authentication processes.
Problems Solved
This technology addresses the need for secure and efficient authentication methods for external devices.
Benefits
- Enhanced security for authentication processes.
- Improved user experience with streamlined authentication methods.
- Reduced risk of unauthorized access to sensitive information.
Commercial Applications
- Secure online transactions in e-commerce platforms.
- Enhanced user authentication in banking and financial services.
- Improved data security in healthcare systems.
Prior Art
Readers can explore prior art related to secure authentication methods, transaction identifiers, and browser-based authentication processes.
Frequently Updated Research
Stay updated on advancements in secure authentication technologies, browser security features, and user authentication methods.
Questions about Authentication Technology
How does this technology improve user security?
This technology enhances user security by implementing secure authentication methods and transaction identifiers to verify user identity.
What are the potential applications of this authentication technology?
The technology can be applied in various industries such as finance, healthcare, and e-commerce for secure user authentication processes.
Original Abstract Submitted
In one embodiment, a method, by an authentication server, includes generating a transaction identifier associated with an authentication request received from an external device. In response to verifying a first authentication factor of the authentication request, the method includes transmitting a prompt and the transaction identifier to the external device, wherein the prompt is an HTTP link associated with a browser comprising a generated cookie, the generated cookie being associated with the transaction identifier. The method includes receiving a signal comprising a transmitted transaction identifier and an instruction to process the HTTP link. The method includes instructing an application installed on the external device to open the browser in a webview in response to processing the instruction, wherein a cookie is provided. The method includes identifying the generated cookie based on verifying the transmitted transaction identifier. The method includes determining if the cookie is equivalent to the generated cookie.
- Cisco Technology, Inc.
- Harold Todd Chapman of Howell MI (US)
- Robert Jacob Linial Small of Ann Arbor MI (US)
- Michael G. Brown of Portland OR (US)
- Adam Vincent Patruno of Canton MI (US)
- Dylan Miles Kite of Ann Arbor MI (US)
- Zachary Oliver Weglarz of Ann Arbor MI (US)
- Erdenebat Gantumur of Ann Arbor MI (US)
- H04L9/40
- G06Q20/38
- G06Q20/40
- CPC H04L63/083