Systems and methods for authenticating a device by a centralized data server
First Claim
1. A method for authenticating a query device using a centralized data server comprising:
- (a) associating and storing, on the centralized data server, for each respective device in a plurality of devices, a device identifier, a user identifier, and a synthesized security identifier that collectively authenticate the respective user device;
(b) receiving, at the centralized data server, an authentication request from an intermediary gateway server that seeks verification of an identity of the query device, wherein the authentication request comprises a query device identifier or a query synthesized security identifier;
(c) attempting to verify, at the centralized data server, the query device by searching for a match between the query device identifier and a stored device identifier or by searching for a match between the query synthesized security identifier and a stored synthesized security identifier, whereinwhen a first match is made between (i) one of the query device identifier and the query synthesized security identifier and (ii) a corresponding device identifier or synthesized security identifier stored on the centralized server and associated with a target device in the plurality of devices, the identity of the query device is verified provided that a second match is made between (i) the other of the query device identifier and the query synthesized security identifier and (ii) a corresponding device identifier or synthesized security identifier stored on the centralized server and associated with the target device; and
(d) communicating, from the centralized data server, whether the identity of the query device is verified to the intermediary gateway server.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods and apparatus for authenticating a query device using a centralized data server include associating and storing, on the server, for each respective device in a plurality of devices, a device identifier, a user identifier, and a synthesized security identifier that collectively authenticate the respective user device. An authentication request is received, at the centralized server, from an intermediary gateway server seeking verification of the query device. The request has a query device identifier or a query synthesized security identifier. Verification, at the centralized data server, of the query device is done by searching for a match between the query device identifier and a stored device identifier and a match between the query synthesized security identifier and a stored synthesized security identifier. The centralized data server communicates to the intermediary gateway server whether the identity of the query device is verified.
-
Citations
51 Claims
-
1. A method for authenticating a query device using a centralized data server comprising:
-
(a) associating and storing, on the centralized data server, for each respective device in a plurality of devices, a device identifier, a user identifier, and a synthesized security identifier that collectively authenticate the respective user device; (b) receiving, at the centralized data server, an authentication request from an intermediary gateway server that seeks verification of an identity of the query device, wherein the authentication request comprises a query device identifier or a query synthesized security identifier; (c) attempting to verify, at the centralized data server, the query device by searching for a match between the query device identifier and a stored device identifier or by searching for a match between the query synthesized security identifier and a stored synthesized security identifier, wherein when a first match is made between (i) one of the query device identifier and the query synthesized security identifier and (ii) a corresponding device identifier or synthesized security identifier stored on the centralized server and associated with a target device in the plurality of devices, the identity of the query device is verified provided that a second match is made between (i) the other of the query device identifier and the query synthesized security identifier and (ii) a corresponding device identifier or synthesized security identifier stored on the centralized server and associated with the target device; and (d) communicating, from the centralized data server, whether the identity of the query device is verified to the intermediary gateway server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51)
-
Specification