US 12,113,788 B2
Provisioning a device to be an authentication device
Gregory B. Roth, Seattle, WA (US); Nathan R. Fitch, Seattle, WA (US); and Graeme D. Baer, Seattle, WA (US)
Assigned to Amazon Technologies, Inc., Seattle, WA (US)
Filed by Amazon Technologies, Inc., Seattle, WA (US)
Filed on Nov. 2, 2020, as Appl. No. 17/087,347.
Application 17/087,347 is a continuation of application No. 15/488,357, filed on Apr. 14, 2017, granted, now 10,826,892.
Application 15/488,357 is a continuation of application No. 13/159,711, filed on Jun. 14, 2011, granted, now 9,628,875, issued on Apr. 18, 2017.
Prior Publication US 2021/0211419 A1, Jul. 8, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 21/35 (2013.01); G06F 21/36 (2013.01); H04L 9/32 (2006.01); H04Q 5/22 (2006.01); H04W 12/06 (2021.01); H04W 12/30 (2021.01); G06F 15/173 (2006.01); H04W 12/77 (2021.01); H04W 88/02 (2009.01)
CPC H04L 63/0838 (2013.01) [G06F 21/35 (2013.01); G06F 21/36 (2013.01); H04L 9/3228 (2013.01); H04L 9/3234 (2013.01); H04L 9/3268 (2013.01); H04L 63/061 (2013.01); H04L 63/08 (2013.01); H04L 63/0853 (2013.01); H04Q 5/22 (2013.01); H04W 12/06 (2013.01); H04W 12/068 (2021.01); H04W 12/35 (2021.01); G06F 15/173 (2013.01); H04W 12/77 (2021.01); H04W 88/02 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method, comprising:
causing a computing device to capture an image displayed on a first system, wherein the image is obtained from a second system as a result of the first system submitting a request to the second system through a first communication channel to generate the image;
determining a challenge code from the image;
generating a response based at least in part on the challenge code and a first authentication information, wherein the first authentication information is obtained by the computing device in response to the computing device transmitting an encryption key generated based on another image to the second system; and
submitting, from the computing device, the response to the second system through a second communication channel, different from the first communication channel, to verify the computing device to perform one or more operations provided by the second system.