Access control system based on a hardware and software signature of a requesting device
First Claim
1. A method for identifying devices and controlling access to a service, comprising the steps of:
- collecting data related to software and hardware configurations from a device through a software agent;
generating a digital signature for the device by hashing the software and hardware configuration data; and
sending the digital signature of the device to an authentication server.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for the authorization of access to a service by a computational device or devices, which may include a wireless device such as a cell phone or a smart phone. A software agent generates a digital signature for the device each time it attempts to access the service and send it to an authentication server, which compares the digital signature sent with one or more digital signatures on file to determine whether access to the service is permitted. The digital signature is generated by using hashes based on software and hardware configuration data collected from the device. The system may be used in conjunction with other authorization methods and devices.
-
Citations
21 Claims
-
1. A method for identifying devices and controlling access to a service, comprising the steps of:
-
collecting data related to software and hardware configurations from a device through a software agent;
generating a digital signature for the device by hashing the software and hardware configuration data; and
sending the digital signature of the device to an authentication server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for identifying devices and controlling access to a service, comprising the steps of:
-
registering a device with an authentication server for access to the service; and
verifying the identity of the device each time it subsequently attempts to access the service. - View Dependent Claims (18, 19, 20)
-
-
21. A system for identifying devices and controlling access to a service, comprising the steps of:
-
a software agent installed on a device, adapted to collect data related to software and hardware configuration of the device;
a digital signature for the device, generated by the software agent by hashing the software and hardware configuration data; and
an authentication server that determines whether the device can access the service based upon the digital signature of the device.
-
Specification