Zero sign-on authentication
First Claim
Patent Images
1. A method of providing zero sign-on (ZSO) authentication comprising:
- determining a media access request from a first device requesting access to a media service associated with a service provider, the media access request being transmitted using signaling through a gateway;
determining a location for the gateway as a function of information included within the media access request;
determining a level of trust for a second device determined to be at the location; and
enabling the first device or operating system ZSO authentication sufficient to access the media service if the level of trust is sufficient and denying the first device or operating system ZSO authentication if the level of trust is insufficient.
1 Assignment
0 Petitions
Accused Products
Abstract
A authenticating system and process for authenticating user devices to a access a media service where access to certain portions of the media service may be limited according to a gateway or other device used by a user device to facilitate interfacing a user with the media service. The authentication may be achieved without directly assessing a trustworthiness of the user devices, and optionally, without requiring a user thereof to complete a sign-on operation.
-
Citations
20 Claims
-
1. A method of providing zero sign-on (ZSO) authentication comprising:
-
determining a media access request from a first device requesting access to a media service associated with a service provider, the media access request being transmitted using signaling through a gateway; determining a location for the gateway as a function of information included within the media access request; determining a level of trust for a second device determined to be at the location; and enabling the first device or operating system ZSO authentication sufficient to access the media service if the level of trust is sufficient and denying the first device or operating system ZSO authentication if the level of trust is insufficient. - View Dependent Claims (2, 3, 4, 9, 10, 11, 12, 13)
-
-
5. The method of 1 further comprising:
-
receiving a credential from the second device; and determining the level of trust for the second device as a function of information included within the credential. - View Dependent Claims (6, 7, 8)
-
-
14. A non-transitory computer-readable medium having a plurality of instructions executable with a processor to facilitate providing zero sign-on (ZSO) authentication, the plurality of instructions being sufficient for:
-
determining a media access request from a first application or a first operating system requesting access to a media service associated with a service provider, the media access request being transmitted using signaling through a gateway or a device; determining a location for the gateway or the device as a function of information included within the media access request; determining a level of trust for a second application or a second operating system determined to be at the location; and enabling the first application or the first operating system ZSO authentication sufficient to access the media service if the level of trust is sufficient and denying the first application or the first operating system ZSO authentication if the level of trust is insufficient. - View Dependent Claims (15, 16, 17)
-
-
18. A non-transitory computer-readable medium having a plurality of instructions executable with a processor to facilitate providing zero sign-on (ZSO) authentication, the plurality of instructions being sufficient for:
-
providing a credential to a first device following successful completion of a sign-on (SO) operation; determining a media access request from a second device requesting access to a media service associated with a service provider, the media access request including the credential provided to the first device; determining a level of trust for the first device as a function of the credential included within the media access request; enabling the first device ZSO authentication sufficient to access the media service if the level of trust is sufficient and denying the first device ZSO authentication if the level of trust is insufficient; determining a location for the second device; determining whether the first device is at the location; and determining the level of trust to be insufficient if first device fails to be at the location. - View Dependent Claims (19, 20)
-
Specification