Adaptive authentication methods, systems, devices, and computer program products
First Claim
1. A method of providing data communications between first and second computing devices over a data network, the method comprising:
- receiving a request for data communication at the first computing device from the second computing device over the data network;
after receiving the request for data communication, transmitting a request for a credential according to an authentication standard from the first computing device to the second computing device wherein the request for the credential identifies the authentication standard;
after transmitting the request for the credential according to the authentication standard, receiving a credential according to the authentication standard;
verifying the credential; and
responsive to receiving the request for data communication and responsive to verifying the authentication credential, allowing the requested data communication.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of providing data communications between first and second computing devices over a data network may include receiving a request for data communication at the first computing device from the second computing device over the data network. After receiving the request for data communication, a request for a credential according to an authentication standard may be transmitted from the first computing device to the second computing device, and the request for the credential may identify the authentication standard. After transmitting the request for the credential according to the authentication standard, a credential according to the authentication standard may be received, and the credential maybe verified. Responsive to receiving the request for data communication and responsive to verifying the authentication credential, the requested data communication may be allowed.
-
Citations
20 Claims
-
1. A method of providing data communications between first and second computing devices over a data network, the method comprising:
-
receiving a request for data communication at the first computing device from the second computing device over the data network;
after receiving the request for data communication, transmitting a request for a credential according to an authentication standard from the first computing device to the second computing device wherein the request for the credential identifies the authentication standard;
after transmitting the request for the credential according to the authentication standard, receiving a credential according to the authentication standard;
verifying the credential; and
responsive to receiving the request for data communication and responsive to verifying the authentication credential, allowing the requested data communication. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of providing data communications between first and second computing devices over a data network, the method comprising:
-
transmitting a request for data communication from the first computing device to the second computing device over the data network;
after transmitting the request for data communication, receiving a request for a credential according to an authentication standard from the second computing device at the first computing device wherein the request for the credential identifies the authentication standard;
after receiving the request for the credential according to the authentication standard, transmitting a credential according to the authentication standard; and
after transmitting the credential, providing the requested data communication. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification