Citrix Systems, Inc.
AUTHENTICATING TO SECURED RESOURCE VIA COUPLED DEVICES
Last updated:
Abstract:
A technique for performing authentication includes a first device receiving security data from a second device that shares its network connection with the first device. The first device applies the security data received from the second device when requesting authentication to a secured resource on the network. For example, the security data may include a token code or other data that may be used as a token, such as identification information about the second device.
Status:
Application
Type:
Utility
Filling date:
30 Dec 2019
Issue date:
2 Jul 2020