US 12,425,452 B2
Device authentication using out-of-band communications
Mohit Arora, Frisco, TX (US); Abeye Teshome, Austin, TX (US); Richard M. Tonry, Georgetown, TX (US); Bassem El-Azzami, Austin, TX (US); Vinodkumar Vasudev Ottar, Mckinney, TX (US); Luis Antonio Valencia Reyes, Waxahachie, TX (US); Adolfo Sandor Montero, Pflugerville, TX (US); and Rajaravi Chandra Kollarapu, Allen, TX (US)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Oct. 31, 2023, as Appl. No. 18/498,261.
Prior Publication US 2025/0141699 A1, May 1, 2025
Int. Cl. H04L 9/40 (2022.01); H04L 9/32 (2006.01)
CPC H04L 63/18 (2013.01) [H04L 9/3271 (2013.01); H04L 63/083 (2013.01); H04L 63/0876 (2013.01); H04L 2463/082 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for authenticating a user device to an application device, the method comprising:
requesting, by in-band hardware resources of the user device, access to a first computer-implemented service provided by the application device;
providing, by the in-band hardware resources, credentials usable by the application device to ascertain whether to initiate a second factor authentication using an out-of-band server; and
in a first instance of the providing where the application device initiates the second factor authentication:
obtaining, by a management controller of the user device and via an out-of-band communication channel of the user device, a challenge for access to the first computer-implemented service from the out-of-band server,
providing, by the management controller and via the out-of-band communication channel, a first response to the challenge to the out-of-band server,
obtaining, by the in-band hardware resources, a second response from the application device, the second response indicating whether the user device should be granted the access to the first computer-implemented service, and
providing, by the in-band hardware resources, a second computer-implemented service based on the second response.