Dynamic authentication in alternate operating environment
First Claim
Patent Images
1. A method, comprising:
- authenticating, by a hardware processor, a device to a network via a first authentication technique during an initial access request;
after successful authentication with the first authentication technique, storing, by the hardware processor, information related to the first authentication technique;
creating, by the hardware processor, a record of the device related to a second authentication technique, wherein the record includes at least the information related to the first authentication technique;
after the device changes state due to an activity that results in a re-authentication with the network, authenticating, by the hardware processor, the device to the network via the second authentication technique during a subsequent access request without re-authenticating with the first authentication technique, the second authentication technique does not rely on manual entry at the device; and
wherein the information related to the first and to the second authentication techniques are annotated and kept in the record of the device until a non-expiration-timing event prompts, by the hardware processor, removal, by the hardware processor, the information related to the first authentication technique and the record of the device related to the second authentication technique.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods that employ dynamic credentials across distinct authentication standards can be used to reduce the burden associated with repeated re-authentication. A utility can be employed during logon in an alternate operating environment that stores information from the logon dynamically and generates a credential file that is employed to grant access to a resource without repeating the earlier logon procedure, even if the device changes its user state. After processes requiring resource access are complete, or when an allowed time expires, the granted access is revoked and the device returns to a default or standard authentication technique.
-
Citations
16 Claims
-
1. A method, comprising:
-
authenticating, by a hardware processor, a device to a network via a first authentication technique during an initial access request; after successful authentication with the first authentication technique, storing, by the hardware processor, information related to the first authentication technique; creating, by the hardware processor, a record of the device related to a second authentication technique, wherein the record includes at least the information related to the first authentication technique; after the device changes state due to an activity that results in a re-authentication with the network, authenticating, by the hardware processor, the device to the network via the second authentication technique during a subsequent access request without re-authenticating with the first authentication technique, the second authentication technique does not rely on manual entry at the device; and wherein the information related to the first and to the second authentication techniques are annotated and kept in the record of the device until a non-expiration-timing event prompts, by the hardware processor, removal, by the hardware processor, the information related to the first authentication technique and the record of the device related to the second authentication technique. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for imaging a device, comprising:
a hardware processor that executes the following executable components stored in a memory; a first access control implementing a first authentication technique that authenticates the device to a network during a first authentication attempt; a database storing information related to the first authentication technique and creating a record of the device related to a second authentication technique, wherein the record includes at least the information related to the first authentication technique; a second access control implementing the second authentication technique after a state of the device changes based on an activity that results in a re-authentication with the network, the second authentication technique is based upon successful authentication of the device to the network by the first access control during the first authentication attempt and authenticates the device to the network on a second authentication attempt without the use of the first access control and without input from the device; and wherein the database storing information related to the first and to the second authentication techniques annotates the record of the device until a non-expiration-timing event prompts, by the hardware processor, removal, by the hardware processor, the information related to the first authentication technique and the record of the device related to the second authentication technique. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
Specification