CONTEXT-BASED ADAPTIVE AUTHENTICATION FOR DATA AND SERVICES ACCESS IN A NETWORK
First Claim
Patent Images
1. A method, comprising:
- sending a command set to a client module via a network;
receiving from the client module via the network a data set associated with the command set and a context identifier;
verifying the command set based on the data set; and
authenticating the client module based on the context identifier such that a service is accessible to the client module after the authenticating, the service being inaccessible to the client module before the authenticating.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes sending a command set to a client module via a network, receiving via the network a context identifier and a data set associated with the command set, verifying the command set, and authenticating the client module. The command set is verified based on the data set. The client module is authenticated based on the context identifier. A service is made accessible to the client module after the authenticating, The service is inaccessible to the client module before the authenticating.
61 Citations
21 Claims
-
1. A method, comprising:
-
sending a command set to a client module via a network; receiving from the client module via the network a data set associated with the command set and a context identifier; verifying the command set based on the data set; and authenticating the client module based on the context identifier such that a service is accessible to the client module after the authenticating, the service being inaccessible to the client module before the authenticating. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
receiving from a client module a first context identifier and a service request via a network; determining whether the service request is valid based on the first context identifier; requesting, after the determining, a second context identifier from the client module; and authorizing the service request based on the second context identifier. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method, comprising:
-
receiving via a network a data set associated with a command set, a context identifier, and a service request; verifying the command set based on the data set; determining whether the service request is authorized based on the context identifier; and performing an action associated with the service request if the service request is authorized. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification