US 11,937,081 B2
Quorum-based secure authentication
Edward J. Gaudet, Hanover, MA (US); and David M. T. Ting, Sudbury, MA (US)
Assigned to Imprivata, Inc., Lexington, MA (US)
Filed by Edward J. Gaudet, Hanover, MA (US); and David M. T. Ting, Sudbury, MA (US)
Filed on Jul. 13, 2021, as Appl. No. 17/374,089.
Application 17/374,089 is a continuation of application No. 16/713,907, filed on Dec. 13, 2019, granted, now 11,096,052.
Application 16/713,907 is a continuation of application No. 15/392,337, filed on Dec. 28, 2016, granted, now 10,542,430, issued on Jan. 21, 2020.
Application 15/392,337 is a continuation of application No. 13/859,894, filed on Apr. 10, 2013, granted, now 9,572,029, issued on Feb. 14, 2017.
Claims priority of provisional application 61/622,161, filed on Apr. 10, 2012.
Prior Publication US 2021/0409945 A1, Dec. 30, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. H04W 12/06 (2021.01); G06F 21/35 (2013.01); G06F 21/40 (2013.01); H04L 9/40 (2022.01); H04W 12/04 (2021.01); H04W 4/80 (2018.01); H04W 12/63 (2021.01)
CPC H04W 12/06 (2013.01) [G06F 21/35 (2013.01); G06F 21/40 (2013.01); H04L 63/061 (2013.01); H04L 63/0853 (2013.01); H04L 63/10 (2013.01); H04W 12/04 (2013.01); H04W 4/80 (2018.02); H04W 12/63 (2021.01)] 24 Claims
OG exemplary drawing
 
1. A wireless mobile device for accessing a resource to which access is controlled in accordance with a predefined, electronically stored quorum-based authentication policy, the device comprising:
communication circuitry for wirelessly interacting with other mobile devices;
an electronically stored identifier for identifying the mobile device and/or a user associated with the mobile device;
a processor;
a memory; and
an electronically stored application for, upon electronic interaction with one or more other mobile devices, (i) receiving a partial key from at least one of the other mobile devices, wherein the partial key comprises keys contributed by one or more of the other mobile devices, (ii) contributing a key for combination with the partial key into a final key, (iii) receiving a second authentication factor, different from the key, from the user associated with the mobile device, and (iv) transmitting the final key and the second authentication factor to an authentication server,
wherein the resource is accessible to the mobile device only if a combination of the second authentication factor and the final key satisfies the authentication policy.