Systems and methods for authenticating a device
First Claim
1. A method for creating a synthesized security identifier for a query device comprising:
- (a) submitting, to a centralized data server, data associated with the query device, wherein the data comprise information associated with a device identifier or a user identifier for the query device, wherein the user identifier is not stored on the query device;
(b) receiving, from the centralized data server, a synthesized security identifier at least partially based on the data from the submitting step (a);
(c) storing the synthesized security identifier permanently on the query device; and
(d) requesting a remote user session by transmitting (i) the device identifier and (ii) the synthesized security identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods and apparatus for authenticating a query device by creating a synthesized security identifier include submitting, to a centralized data server, data associated with the query device. The data comprise information associated with a device identifier or a user identifier for the query device. The user identifier is not stored on the query device. The query device receives, from the centralized data server, a synthesized security identifier at least partially based on the data from the submitting step and stories the synthesized security identifier permanently on the query device. The query device further requests a remote user session by transmitting (i) the device identifier and (ii) the synthesized security identifier.
109 Citations
49 Claims
-
1. A method for creating a synthesized security identifier for a query device comprising:
-
(a) submitting, to a centralized data server, data associated with the query device, wherein the data comprise information associated with a device identifier or a user identifier for the query device, wherein the user identifier is not stored on the query device; (b) receiving, from the centralized data server, a synthesized security identifier at least partially based on the data from the submitting step (a); (c) storing the synthesized security identifier permanently on the query device; and (d) requesting a remote user session by transmitting (i) the device identifier and (ii) the synthesized security identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method for authenticating a query device to a centralized data server, wherein the method comprises:
-
(a) associating and storing, on the centralized data server, for each respective device in a plurality of devices, a device identifier, a user identifier, and a synthesized security identifier that collectively authenticate the respective user device; (b) receiving, at the centralized data server, an authentication request that seeks verification of an identity of the query device, wherein the authentication request comprises a query device identifier, a query synthesized security identifier and a query user identifier; (c) attempting to verify, at the centralized data server, the query device by (i) searching for a match between the query device identifier and a stored device identifier, (ii) searching for a match between the query synthesized security identifier and a stored synthesized security identifier, and (iii) searching for a match between the query user identifier and a stored user identifier; and (d) communicating, from the centralized data server, whether the identity of the query device is verified to an intermediary gateway server. - View Dependent Claims (35, 36, 37)
-
-
38. A method for authenticating a query device to a centralized data server, wherein the method comprises:
-
(a) storing, on the query device, a device identifier and a synthesized security identifier that collectively authenticate the query device; (b) submitting an authentication request that comprises the device identifier or the synthesized security identifier, wherein the synthesized security identifier is derived, at least in part, from an IPv6 address for the query device; and (c) receiving verification that there is a match between the query device identifier and a device identifier stored on the centralized data server and a match between the query synthesized security identifier and a synthesized security identifier stored on the centralized data server. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
-
49. A query device comprising a central processing unit and a computer readable memory coupled with the central processing unit, the computer readable memory including instructions for authenticating the query device to a centralized data server by:
-
(a) storing a device identifier and a synthesized security identifier in the computer readable memory that collectively authenticate the query device; (b) submitting an authentication request that comprises the device identifier or the synthesized security identifier, wherein the synthesized security identifier is derived, at least in part, from an IPv6 address for the query device; and (c) receiving verification that there is a match between the query device identifier and a device identifier stored on the centralized data server and a match between the query synthesized security identifier and a synthesized security identifier stored on the centralized data server.
-
Specification