Systems and methods for facilitating authentication of network devices
First Claim
Patent Images
1. A method comprising:
- utilizing an identifier already affiliated with a device as a username in an authentication process;
generating a password and an authentication key based on at least the username and providing the password and authentication key to the device; and
upon attempted access to a network service by the device, exchanging the username, password and authentication key to determine the authenticity of the device.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, apparatuses and methods for facilitating authentication and logons for network devices. An identifier that is already affiliated with a device is used as a username in an authentication process. A password and an authentication key are generated based on at least the username, and the password and authentication key are provided to the device. Upon attempted access to a network service by the device, the username, password and authentication key are exchanged in some manner to determine the authenticity of the device.
-
Citations
49 Claims
-
1. A method comprising:
-
utilizing an identifier already affiliated with a device as a username in an authentication process; generating a password and an authentication key based on at least the username and providing the password and authentication key to the device; and upon attempted access to a network service by the device, exchanging the username, password and authentication key to determine the authenticity of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus comprising:
-
a receiver to receive an identifier otherwise used in a communication device; a processor configured to recognize the received identifier as a username in a username/password pair, and to generate a password and authentication key based on the recognized username; a transmitter to provide the password and authentication key to the communication device; and wherein the processor is further configured to determine the authenticity of the communication device based on an exchange of the identifier, generated password and generated authentication key with the communication device. - View Dependent Claims (12, 13, 14)
-
-
15. A computer-readable medium having instructions stored thereon that are executable by a computing system for facilitating authentication of a device by performing steps comprising:
-
establishing a username to correspond to an identifier already affiliated with a device; generating a password and an authentication key based on at least the username and providing the password and authentication key to the device; and upon attempted access to a network service by the device, exchanging the username, password and authentication key to determine the authenticity of the device.
-
-
16. A method comprising:
-
receiving a notification of a user requesting access to a network service session; generating an identification key for the network service session, and providing the identification key to the network service session for presentation to the user requesting access to the network service; receiving a user-entered identification key via the network service session; and comparing the generated identification key to the user-entered identification key to effect a sign-on procedure. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A method comprising:
-
a network service recognizing an attempt by a user to access a network service session hosted by the network service; transmitting a request from the network service to a signing server for a unique identification key; the signing server generating the unique identification key for the network service session, and providing the unique identification key to the network service session; the network service presenting the unique identification key via at least one network-addressable document of the network service session; the network service receiving a user-entered identification key input via the network-addressable document and providing the user-entered identification key to the signing server; and the signing server comparing the unique identification key and the user-entered identification key, and allowing the user to sign on to the network service session with a device if the unique identification key and the user-entered identification key match. - View Dependent Claims (27)
-
-
28. An apparatus comprising:
-
a receiver to receive a notification of a user requesting access to a network service session; a processor configured to generate an identification key for the network service session; a transmitter to provide the identification key to the network service session for presentation to the user requesting access to the network service; wherein the receiver further receives a user-entered identification key via the network service session; and wherein the processor is further configured to compare the generated identification key to the user-entered identification key to effect a sign-on procedure. - View Dependent Claims (29, 30, 31, 32)
-
-
33. A computer-readable medium having instructions stored thereon that are executable by a computing system for signing a device to a network service by performing steps comprising:
-
receiving a notification of a user requesting access to a network service session; generating an identification key for the network service session, and providing the identification key to the network service session for presentation to the user requesting access to the network service; receiving a user-entered identification key via the network service session; and comparing the generated identification key to the user-entered identification key to effect a sign-on procedure.
-
-
34. A method comprising:
-
determining whether there is a local cookie available for a first network service session accessed by a device; if there is no local cookie available, determining whether the user has logged onto at least one second network service session; and if a cookie from the at least one second network service session is found, using the cookie from the second network service session as the cookie for the first network service session. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. An apparatus comprising:
-
storage to store one or more cookies available to the apparatus; and a processor configured to determine whether the storage has a cookie stored therein for a first network service session, and if not, to use the cookie from a second network service session as the cookie for the first network service session. - View Dependent Claims (45, 46, 47)
-
-
48. An apparatus comprising:
-
a processor configured to generate a request to access a network service session; a transmitter configured to transmit the request; a user interface configured to facilitate user entry of an identification key generated and presented external to the apparatus in response to the request to access the network service session; and wherein the transmitter is further configured to transmit the identification key to solicit authentication for accessing the network service session. - View Dependent Claims (49)
-
Specification