Authentication surety and decay system and method
First Claim
1. A method in a computing environment for maintaining security and access to a plurality of networked devices, comprising:
- accepting a user identification;
assigning a surety level to said user identification; and
utilizing said user identification in conjunction with said surety level to grant or deny access to a plurality of networked devices.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to a method and system for use in security authentication in a network environment. The present invention enables shared security information by networked devices. It also allows access to networked devices on the basis of authentication surety. The system assigns surety levels on the basis of the modes and methods of user authentication to the network. Further, the present invention allows the gradual decay, of user authentication and thus access to networked devices over time. Further still, the present invention distinguishes between individual identities and personas within the network environment. Surety levels associated with an authentication provide a predetermined level of access to networked devices or device features. The present invention provides improved security and diminishes the risk of fraudulent access to a network via identity theft.
79 Citations
29 Claims
-
1. A method in a computing environment for maintaining security and access to a plurality of networked devices, comprising:
-
accepting a user identification;
assigning a surety level to said user identification; and
utilizing said user identification in conjunction with said surety level to grant or deny access to a plurality of networked devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method in a network environment for providing access to a plurality of networked devices, based on the network'"'"'s knowledge of a user'"'"'s presence, comprising:
-
obtaining an identification from a user;
authenticating said identification; and
making said authenticated identification available to the plurality of networked devices, by providing a storage of said authenticated identification and a requesting process that utilizes said storage. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method in a computing environment for providing secure access to a networked client device on the basis of the certainty associated with a user authentication, comprising:
-
accepting the user identification from a networked input device;
assigning a surety level on the basis of the accuracy of said networked input device, the accuracy being determined as the ability of said networked input device to correctly and uniquely identify an individual; and
utilizing said surety level to grant or deny access to portions of the networked client device or the entire networked client device, by said user.
-
-
21. A system for providing authentication in an environment having a number of networked devices, comprising:
-
a memory;
an authentication module component to receive requests for access to any one or more of the networked devices; and
a location access control component to provide information on accessible properties of the one or more networked devices and manage events associated with authentications, for storage in said memory;
- View Dependent Claims (22, 23)
-
-
24. A method in a computing environment for providing secure access, comprising:
-
associating a surety value with a user authentication;
utilizing said surety value to provide access to one or more features of the computing environment; and
decaying said surety value over time to better secure the provided access. - View Dependent Claims (25)
-
-
26. A computer readable medium containing instructions for maintaining security and access to a plurality of networked devices, the instructions comprising:
-
accepting a user identification;
assigning a surety level to said user identification; and
utilizing said user identification in conjunction with said surety level to grant access to a plurality of networked devices.
-
-
27. A method in a computing environment for providing controlled access, comprising:
-
providing multiple personas for a user identity;
defining access rights to features of the computing environment for each of said multiple personas, wherein said access rights may be identical or different;
identifying at least one persona corresponding to a login event by said user identity;
authentication said at least one persona; and
providing access to only the features associated with said persona rather than all features that are available to said user identity. - View Dependent Claims (28)
-
-
29. A method in a computing environment for authenticating access to a networked device, comprising:
-
receiving a user request for access;
requesting a property information structure, to obtain information relating to properties of the network device that can potentially be accessed;
wherein said property information structure specifies a required access level that any user must have in order to access said network device property; and
allowing access to said network device property if said requesting user meets said required access level.
-
Specification