Citrix Systems, Inc.
AUTHENTICATING TO SECURED RESOURCE VIA COUPLED DEVICES

Last updated:

Abstract:

A technique for performing authentication includes a first device receiving security data from a second device that shares its network connection with the first device. The first device applies the security data received from the second device when requesting authentication to a secured resource on the network. For example, the security data may include a token code or other data that may be used as a token, such as identification information about the second device.

Status:
Application
Type:

Utility

Filling date:

30 Dec 2019

Issue date:

2 Jul 2020