CPC H04L 63/0815 (2013.01) | 20 Claims |
1. A method for facilitating application authentication bypass based on a timeline of successful device authentications, the method being implemented by at least one processor, the method comprising:
receiving, by the at least one processor, a request from a user to access an application on a user device, the request including an application authentication request, wherein the application has at least one application authentication requirement;
accessing, by the at least one processor, the user device via a device application programming interface;
retrieving, by the at least one processor via the device application programming interface, device authentication data, the device authentication data including the timeline of successful device authentications;
determining, by the at least one processor based on the timeline of successful device authentications, whether the device authentication data is within a predetermined threshold time period;
when the device authentication data is within the predetermined threshold time period, bypassing the at least one application authentication requirement and authenticating, by the at least one processor, the request by using the device authentication data; and
permitting, by the at least one processor, access to the application based on a result of the authenticating.
|