Real Estate Financial Analysis Real Estate Investment Negotiation Start-ups Contract Negotiation Tenant Site Selection Leases Strategic Planning Business Strategy Real Estate Transactions Corporate Real Estate Investment Properties Location Intelligence
- Portland OR, US Yo Sub Kwon - Las Vegas NV, US Geoffrey R. Sanders - Las Vegas NV, US Christopher C. Shepherd - Las Vegas NV, US Kristin F. Tomasik - Las Vegas NV, US
International Classification:
H04L 29/06
Abstract:
The field of the invention relates to network connected authentication systems, and more particularly to systems and methods that enable authentication of one or more users of a group using network connected devices. In an embodiment, the system includes a network connected authentication server coupled to a network for access by a plurality of user devices in a group to authenticate a user of one or more third party applications. When a user of the group visits a third party application and initiates a group authentication, the network connected authentication server retrieves authentication rules and sends authentication requests to the user devices of the group based on the authentication rules. When the network connected authentication server receives authentication responses from the user devices, the network connected authentication server sends the responses to the third party application, which determines whether approval should be granted based on the responses and on the policies of the third party application.
- Las Vegas NV, US Yo Sub Kwon - Las Vegas NV, US Geoffrey R. Sanders - Las Vegas NV, US Christopher C. Shepherd - Las Vegas NV, US Kristin F. Tomasik - Las Vegas NV, US
International Classification:
H04L 29/06
US Classification:
726 5
Abstract:
The field of the invention relates to network connected authentication systems, and more particularly to systems and methods that enable authentication of one or more users of a group using network connected devices. In an embodiment, the system includes a network connected authentication server coupled to a network for access by a plurality of user devices in a group to authenticate a user of one or more third party applications. When a user of the group visits a third party application and initiates a group authentication, the network connected authentication server retrieves authentication rules and sends authentication requests to the user devices of the group based on the authentication rules. When the network connected authentication server receives authentication responses from the user devices, the network connected authentication server sends the responses to the third party application, which determines whether approval should be granted based on the responses and on the policies of the third party application.