Just-in-time authentication of users of a digital home network
First Claim
1. A network with network nodes and a software system distributed over the network nodes within which, on first access to an access-protected object of the system an authentication is provided, where the authentication is valid at least for a further access to an access-protected object and a duration of the validity of authentication is dependent on the duration of access to the access-protected object and/or on the context of the use of the system.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention relates to a network with network nodes and a software system distributed over the network nodes within which, on first access to an access-protected object of the system, an authentication of the user is provided, where the authentication is valid at least for a further access to an access-protected object and a duration of the validity of the authentication is dependent on the duration of access to the access-protected object and/or on the context of the use of the system.
-
Citations
8 Claims
- 1. A network with network nodes and a software system distributed over the network nodes within which, on first access to an access-protected object of the system an authentication is provided, where the authentication is valid at least for a further access to an access-protected object and a duration of the validity of authentication is dependent on the duration of access to the access-protected object and/or on the context of the use of the system.
-
8. A method of authenticating a user within a network with network nodes and a software system distributed over the network nodes, characterized that on first access to an access-protected object of the system a user authentication is provided where a duration of validity of the authentication is dependent on the duration of access to the access-protected object and on the context of the use of the system.
Specification