US 12,335,725 B2
Quorum-based secure authentication
Edward J. Gaudet, Hanover, MA (US); and David M. T. Ting, Sudbury, MA (US)
Assigned to Imprivata, Inc., Lexington, MA (US)
Filed by Edward J. Gaudet, Hanover, MA (US); and David M. T. Ting, Sudbury, MA (US)
Filed on Feb. 12, 2024, as Appl. No. 18/438,620.
Application 18/438,620 is a continuation of application No. 17/374,089, filed on Jul. 13, 2021, granted, now 11,937,081.
Application 17/374,089 is a continuation of application No. 16/713,907, filed on Dec. 13, 2019, granted, now 11,096,052, issued on Aug. 17, 2021.
Application 16/713,907 is a continuation of application No. 15/392,337, filed on Dec. 28, 2016, granted, now 10,542,430, issued on Jan. 21, 2020.
Application 15/392,337 is a continuation of application No. 13/859,894, filed on Apr. 10, 2013, granted, now 9,572,029, issued on Feb. 14, 2017.
Claims priority of provisional application 61/622,161, filed on Apr. 10, 2012.
Prior Publication US 2024/0267727 A1, Aug. 8, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04W 12/06 (2021.01); G06F 21/35 (2013.01); G06F 21/40 (2013.01); H04L 9/40 (2022.01); H04W 12/04 (2021.01); H04W 4/80 (2018.01); H04W 12/63 (2021.01)
CPC H04W 12/06 (2013.01) [G06F 21/35 (2013.01); G06F 21/40 (2013.01); H04L 63/061 (2013.01); H04L 63/0853 (2013.01); H04L 63/10 (2013.01); H04W 12/04 (2013.01); H04W 4/80 (2018.02); H04W 12/63 (2021.01)] 14 Claims
OG exemplary drawing
 
1. A method of secure authentication to a resource in accordance with a predefined, electronically stored quorum-based authentication policy, the resource residing on a computer network having an authentication server residing thereon, the method comprising:
assembling a final key via electronic interaction among a plurality of devices (i) each associated with a different user thereof, and (ii) constituting a quorum in accordance with the authentication policy, each of the devices contributing a different key for assembly into the final key;
after the final key is assembled, transmitting the final key to the authentication server; and
when the authentication server computationally determines that the final key satisfies the authentication policy, electronically according access to the resource,
wherein the users associated with the plurality of devices are members of a plurality of different groups, and the quorum comprises at least one user from each of the groups.