AUTHENTICATING A DEVICE WITH A SERVER OVER A NETWORK
First Claim
1. A method of authenticating a device with a server over a network, the method comprising the steps of:
- authenticating, by the device, the server so as to establish a secure connection with the server;
communicating, by the device, identification information of the device to the server, wherein the identification information uniquely identifies the device to the server;
determining, by the server, the credibility of the device using the identification information communicated by the device; and
in a case where the server determines that the device is credible;
creating, by the server, a first authentication token for the device;
storing, by the server, the first authentication token;
transferring, by the server, the first authentication token to the device using the secure connection;
storing, by the device, the first authentication token; and
authenticating, by the server, the device using the first authentication token.
1 Assignment
0 Petitions
Accused Products
Abstract
The authentication of a device with a server over a network includes authenticating, by the device, the server so as to establish a secure connection with the server. The device communicates identification information of the device to the server, wherein the identification information uniquely identifies the device to the server. The server determines the credibility of the device using the identification information communicated by the device. In a case where the server determines that the device is credible, the server creates a first authentication token for the device, stores the first authentication token, and transfers the first authentication token to the device using the secure connection, and the device stores the first authentication token. The server authenticates the device using the first authentication token.
99 Citations
20 Claims
-
1. A method of authenticating a device with a server over a network, the method comprising the steps of:
-
authenticating, by the device, the server so as to establish a secure connection with the server; communicating, by the device, identification information of the device to the server, wherein the identification information uniquely identifies the device to the server; determining, by the server, the credibility of the device using the identification information communicated by the device; and in a case where the server determines that the device is credible; creating, by the server, a first authentication token for the device; storing, by the server, the first authentication token; transferring, by the server, the first authentication token to the device using the secure connection; storing, by the device, the first authentication token; and authenticating, by the server, the device using the first authentication token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-readable memory medium on which is stored computer-executable process steps for causing a computer to authenticate a device with a server over a network, the process steps comprising:
-
authenticating, by the device, the server so as to establish a secure connection with the server; communicating, by the device, identification information of the device to the server, wherein the identification information uniquely identifies the device to the server; determining, by the server, the credibility of the device using the identification information communicated by the device; and in a case where the server determines that the device is credible; creating, by the server, a first authentication token for the device; storing, by the server, the first authentication token; transferring, by the server, the first authentication token to the device using the secure connection; storing, by the device, the first authentication token; and authenticating, by the server, the device using the first authentication token. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A device for authentication by a server over a network, the device comprising:
-
a computer-readable memory constructed to store computer-executable process steps; and a processor constructed to execute the computer-executable process steps stored in the memory; wherein the computer-executable process steps comprise; authenticating the server so as to establish a secure connection with the server; communicating identification information of the device to the server, wherein the identification information uniquely identifies the device to the server; and in a case where the server determines that the device is credible based on the identification information, receiving a first authentication token from the server; and storing the first authentication token, wherein the device is authenticated by the server using the first authentication token.
-
-
20. A server for authenticating a device over a network, the server comprising:
-
a computer-readable memory constructed to store computer-executable process steps; and a processor constructed to execute the computer-executable process steps stored in the memory; wherein the computer-executable process steps comprise; being authenticated by the device, so as to establish a secure connection between the device and the server; receiving identification information from the device, wherein the identification information uniquely identifies the device to the server; determining the credibility of the device using the identification information; and in a case where it is determined that the device is credible; creating a first authentication token for the device; storing the first authentication token; transferring the first authentication token to the device using the secure connection; and authenticating the device using the first authentication token.
-
Specification