发明名称 Techniques for user authentication
摘要 Techniques for user authentication are disclosed. In some situations, the techniques include receiving, from a client device, an authentication request to access a network resource, the request including a user identifier, obtaining a security credential associated with the user identifier contained in the received request, generating an authorization code based on the obtained security credential, providing to the client device instructions to obtain first information corresponding to the generated authorization code, receiving, from the client device, the first information provided in response to the provided instructions, and, when the first information received from the client device corresponds to at least a portion of the generated authorization code, authorizing the client device to access the network resource.
申请公布号 US8925062(B1) 申请公布日期 2014.12.30
申请号 US201314080599 申请日期 2013.11.14
申请人 Amazon Technologies, Inc. 发明人 Brezinski Dominique I.;Kirzhner Benjamin S.;Buneci Emilia S.;O'Reilly Martin M.;Durgin Cyrus J.;LaRue Lane R.
分类号 G06F7/04;G06F21/32;G06F21/31;H04L29/06;G07C9/00 主分类号 G06F7/04
代理机构 Seed IP Law Group PLLC 代理人 Seed IP Law Group PLLC
主权项 1. A computer-implemented method comprising: receiving, by a configured computing system, an authentication request to access a network resource on behalf of an indicated user; generating, by the configured computing system, an authorization code based on a security phrase associated with the indicated user, the generating including selecting a first subset of characters in the security phrase to use for the authorization code and including excluding a distinct second subset of the characters in the security phrase from use for the authorization code; providing, by the configured computing system, instructions to the indicated user regarding obtaining the generated authorization code, the provided instructions including information related to the selected first subset without providing the characters in the selected first subset; receiving, by the configured computing system, information from the indicated user that includes the generated authorization code, the received information not including the excluded second subset of characters; and in response to the received information including the generated authorization code, authorizing the access to the network resource.
地址 Reno NV US