US 11,902,274 B2
System and computer readable media enabling methods for permitting a request after verifying knowledge of first and second secrets
Kevin Patrick Mahaffey, San Francisco, CA (US); Timothy Micheal Wyatt, Toronto (CA); Brian James Buck, Livermore, CA (US); Matthew Robert Baker, San Francisco, CA (US); Danielle Hewson Kingsley, San Francisco, CA (US); Elaine P. Teoh, San Francisco, CA (US); and Marc William Rogers, Moraga, CA (US)
Assigned to LOOKOUT, INC., Boston, MA (US)
Filed by LOOKOUT, INC., Boston, MA (US)
Filed on Apr. 24, 2023, as Appl. No. 18/305,559.
Application 16/575,140 is a division of application No. 15/410,655, filed on Jan. 19, 2017, granted, now 10,469,481, issued on Nov. 5, 2019.
Application 15/410,655 is a division of application No. 14/583,501, filed on Dec. 26, 2014, granted, now 9,602,508, issued on Mar. 21, 2017.
Application 18/305,559 is a continuation of application No. 17/165,054, filed on Feb. 2, 2021, granted, now 11,637,823, issued on Apr. 25, 2023.
Application 17/165,054 is a continuation of application No. 16/575,140, filed on Sep. 18, 2019, granted, now 11,050,736, issued on Jun. 29, 2021.
Claims priority of provisional application 62/051,230, filed on Sep. 16, 2014.
Claims priority of provisional application 61/921,025, filed on Dec. 26, 2013.
Prior Publication US 2023/0262050 A1, Aug. 17, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 29/00 (2006.01); H04L 9/40 (2022.01); H04W 12/069 (2021.01); H04W 12/084 (2021.01); H04L 9/06 (2006.01); H04L 9/32 (2006.01)
CPC H04L 63/083 (2013.01) [H04L 9/0643 (2013.01); H04L 9/3226 (2013.01); H04L 9/3271 (2013.01); H04L 63/0869 (2013.01); H04L 63/10 (2013.01); H04W 12/069 (2021.01); H04W 12/084 (2021.01)] 20 Claims
OG exemplary drawing
 
1. A computer program product comprising computer-readable program code to be executed by one or more processors when retrieved from a non-transitory computer-readable medium, the program code including instructions to:
receive a notification regarding a computing device;
send at least one instruction, in response to the notification, to deny use of at least one computing device function until the computing device receives at least one instruction to permit the use of the at least one denied computing device function;
receive a request from a requesting party to initiate an action on the computing device, the action requiring the use of the at least one denied computing device function;
send, in response to the request, a message to a set of designated authorizing parties, the message regarding whether to permit the use of the at least one denied computing device function;
authenticate a first party, the first party being from the set of designated authorizing parties;
authenticate a second party, the second party being from the set of designated authorizing parties, the second party being different from the first party;
receive authorization from the first party;
receive authorization from the second party; and
after successful authentications of the first and second parties and receipt of the authorization from the first party and receipt of the authorization from the second party, send at least one instruction to the computing device that permits the use of the at least one denied computing device function and permits the action requiring the use of the at least one denied computing device function.