US 11,963,006 B2
Secure mobile initiated authentication
George Avetisov, New York, NY (US); Roman Kadinsky, New York, NY (US); and Bojan Simic, New York, NY (US)
Assigned to HYPR Corp., New York, NY (US)
Filed by HYPR Corp., New York, NY (US)
Filed on Aug. 3, 2022, as Appl. No. 17/880,585.
Application 17/880,585 is a continuation of application No. 16/932,605, filed on Jul. 17, 2020, granted, now 11,438,764.
Application 16/932,605 is a continuation of application No. 15/931,461, filed on May 13, 2020, granted, now 10,764,752, issued on Sep. 1, 2020.
Application 15/931,461 is a continuation in part of application No. 16/373,561, filed on Apr. 2, 2019, granted, now 11,057,366, issued on Jul. 6, 2021.
Application 16/373,561 is a continuation in part of application No. 16/270,255, filed on Feb. 7, 2019, granted, now 10,601,828, issued on Mar. 24, 2020.
Claims priority of provisional application 62/951,945, filed on Dec. 20, 2019.
Claims priority of provisional application 62/720,609, filed on Aug. 21, 2018.
Claims priority of provisional application 62/720,590, filed on Aug. 21, 2018.
Prior Publication US 2022/0394468 A1, Dec. 8, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04W 12/06 (2021.01); G06F 21/45 (2013.01); H04L 9/40 (2022.01); H04W 12/069 (2021.01); H04W 12/08 (2021.01)
CPC H04W 12/068 (2021.01) [G06F 21/45 (2013.01); H04L 63/062 (2013.01); H04L 63/083 (2013.01); H04L 63/0884 (2013.01); H04L 63/18 (2013.01); H04L 63/20 (2013.01); H04W 12/069 (2021.01); H04W 12/08 (2013.01); G06F 2221/2149 (2013.01)] 30 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
obtaining a registration value by a first computing device, the registration value corresponding to a second computing device;
transmitting, to a server system, the registration value;
establishing a set of credentials corresponding a user within a memory of the first computing device;
transmitting, to the server system, first data for verifying results of authentication of the user determined by the first computing device;
receiving a request to login the user on the second computing device;
determining, in response to the request, a result of authentication of the user on the first computing device based on obtained input corresponding to the user and the set of credentials; and
transmitting, to the server system, second data indicative of the result of authentication of the user to cause the server system to login the user on the second computing device in response to verification of the second data based on the first data.