US 11,991,181 B2
Multi factor authentication
Doron Milchtaich, Rehovot (IL)
Assigned to CORONET CYBER SECURITY LTD., Tel-Aviv (IL)
Appl. No. 17/596,344
Filed by CORONET CYBER SECURITY LTD., Tel-Aviv (IL)
PCT Filed Jul. 31, 2019, PCT No. PCT/IB2019/056529
§ 371(c)(1), (2) Date Dec. 8, 2021,
PCT Pub. No. WO2021/019285, PCT Pub. Date Feb. 4, 2021.
Prior Publication US 2022/0224692 A1, Jul. 14, 2022
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/102 (2013.01) [H04L 63/0861 (2013.01); H04L 63/105 (2013.01); H04L 2463/082 (2013.01)] 22 Claims
OG exemplary drawing
 
1. A method of multi-factor authentication, the method comprising computer executed steps, the steps comprising:
from a computer of a cloud service, receiving data identifying a user logged-in to the cloud service after being successfully authenticated using a first authentication factor;
communicating with a client device of the user identified by the received data, for receiving a second authentication factor from the user;
determining whether the second authentication factor received from the user is valid;
based on a result of said determining, determining a first user-permission policy for the user; and
communicating the determined first user-permission policy to the computer of the cloud service, for the cloud service to base a restriction of usage of the cloud service by the user on, wherein said determining of the first user-permission policy comprises selecting the first user-permission policy among at least two predefined policies, and wherein a first one of the predefined policies pertains to the second authentication factor being determined to be valid and a second one of the predetermined policies pertains to the second authentication factor not being determined to be valid.