Zero sign-on authentication
First Claim
Patent Images
1. A method of providing zero sign-on (ZSO) authentication comprising:
- determining an access request from a first device requesting access to a service associated with a service provider, the access request being transmitted using signaling through an access point;
determining a location for the access point as a function of information included within the access request;
determining a level of trust for a second device determined to be at the location; and
enabling the first device ZSO authentication sufficient to access the service if the level of trust is sufficient and denying the first device or operating system ZSO authentication if the level of trust is insufficient.
1 Assignment
0 Petitions
Accused Products
Abstract
An authenticating system and process for authenticating user devices to a access a service where access to certain portions of the service may be limited according to a access point or other device used by a user device to facilitate interfacing a user with the service. The authentication may be achieved without directly assessing a trustworthiness of the user devices, and optionally, without requiring a user thereof to complete a sign-on operation.
-
Citations
20 Claims
-
1. A method of providing zero sign-on (ZSO) authentication comprising:
-
determining an access request from a first device requesting access to a service associated with a service provider, the access request being transmitted using signaling through an access point; determining a location for the access point as a function of information included within the access request; determining a level of trust for a second device determined to be at the location; and enabling the first device ZSO authentication sufficient to access the service if the level of trust is sufficient and denying the first device or operating system ZSO authentication if the level of trust is insufficient. - View Dependent Claims (2, 3, 4, 9, 10, 11, 12, 13)
-
- 5. The method of 1 further comprising determining the level of trust for the second device as a function of information included within a credential transmitted therefrom.
-
14. A non-transitory computer-readable medium having a plurality of instructions executable with a processor to facilitate providing zero sign-on (ZSO) authentication, the plurality of instructions being sufficient for:
-
determining an access request from a first application requesting access to a service associated with a service provider, the access request being transmitted through a device; determining a location for the device as a function of information included within the access request; determining a level of trust for a second application determined to be at the location; and enabling the first application ZSO authentication sufficient to access the service if the level of trust is sufficient and denying the first application ZSO authentication if the level of trust is insufficient. - View Dependent Claims (15, 16, 17)
-
-
18. A method for conferring authorizations to access content comprising:
-
determining a first device requiring an authorization to access content; determining an access point utilized by the first device to request access to the content; determining a second device having the authorization being at a location associated with the access point; and conferring the authorization of the second device to the first device to enable the first device access to the content. - View Dependent Claims (19, 20)
-
Specification