Apparatus and method for authenticating access to a network resource using multiple shared devices
First Claim
1. A method for providing secure access to network resources for a plurality of users, wherein each user utilizes any single device of a device fleet, comprising the steps of:
- selecting a device from said fleet of devices accessible to a user;
imputing said user information into said selected device;
transmitting said user information to a credentials database server;
returning an encrypted user specific credentials database to said selected device;
returning to said credential database server an encrypted database key or an acknowledgement;
deciphering said user specific credentials database using said encrypted database key;
accessing with said selected device multiple network resources; and
finalizing use of said selected device.
1 Assignment
0 Petitions
Accused Products
Abstract
Means that allow multiple users to be authorized to authenticate through a single given mobile device are described. These means apply as well for the case that the number of users is so large the device does not store all of their authentication information in memory simultaneously. These means allow the authentication information to be securely transferred from a server to the device at the time that the user attempts to authenticate. The device utilizes means and methods that allow this information to be cached to speed up communication during periods when only a few users use the single device.
-
Citations
50 Claims
-
1. A method for providing secure access to network resources for a plurality of users, wherein each user utilizes any single device of a device fleet, comprising the steps of:
-
selecting a device from said fleet of devices accessible to a user;
imputing said user information into said selected device;
transmitting said user information to a credentials database server;
returning an encrypted user specific credentials database to said selected device;
returning to said credential database server an encrypted database key or an acknowledgement;
deciphering said user specific credentials database using said encrypted database key;
accessing with said selected device multiple network resources; and
finalizing use of said selected device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 22, 23, 24, 25, 26)
-
-
8. A device for providing a user with secure access to a network resource, comprising:
-
a first module for authenticating a user to said device;
a second module responsive to said first module for providing the user with access to the network resource using a network resource password unknown to the user. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49)
-
-
50. An article of manufacture comprising:
-
a computer program product comprising a computer-usable medium having a computer-readable code therein for authenticating a user to a device for contacting a network resource, the computer-readable code in the article of manufacture comprising;
a computer-readable program code module for receiving a user password;
a computer-readable program code module for receiving biometrics;
a computer-readable program code module for determining if the user password and the user biometrics match the password and the biometrics of an authorized user;
a computer-readable program code module for retrieving a randomly generated password for the network resource; and
a computer-readable program code module for transmitting the randomly generated password to the network resource to gain access thereto.
-
Specification