Modular Device Authentication Framework
First Claim
1. A computer-implemented method for providing access to a service, comprising:
- storing authentication modules to authenticate devices requesting access to the service, the devices including at least a first plurality of devices having a first device type and a second plurality of devices having a second device type;
configuring a first one of the authentication modules to perform authentication of the first plurality of devices using an authentication scheme specific to the first device type;
configuring a second one of the authentication modules to perform authentication of the second plurality of devices using an authentication scheme specific to the second device type;
receiving, by a server, a request to access the service, the request including a device type identifier of a device requesting the service;
extracting the device type identifier from the request;
determining whether the device type identifier corresponds to the first device type or the second device type;
selecting the first authentication module if the device type identifier corresponds to the first device type, and selecting the second authentication module if the device type identifier corresponds to the second device type;
authenticating the request using the selected authentication module to determine whether the requesting device is permitted to access the service, thereby performing authentication of the requesting device using the authentication scheme specific to the requesting device; and
providing access to the service when the selected authentication module determines that the requesting device is authorized to access the service, and preventing access to the service when the selected authentication module determines that the requesting device is not authorized to access the service.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and computer-readable media provide a requesting device with access to a service. In one implementation, a server receives a request to access a service, and the request includes a device type identifier of a device requesting access to the service. The server extracts the device type identifier from the request and determines a corresponding device type for the requesting device. An authentication module is selected from a plurality of authentication modules based on the device type identifier, and the selected authentication module implements an authentication scheme for the device type of the requesting device. The server authenticates the request using the selected authentication module to determine whether the requesting device is permitted to access the service, and provides access to the service based on at least a determination that the requesting device is authorized to access the service.
-
Citations
15 Claims
-
1. A computer-implemented method for providing access to a service, comprising:
-
storing authentication modules to authenticate devices requesting access to the service, the devices including at least a first plurality of devices having a first device type and a second plurality of devices having a second device type; configuring a first one of the authentication modules to perform authentication of the first plurality of devices using an authentication scheme specific to the first device type; configuring a second one of the authentication modules to perform authentication of the second plurality of devices using an authentication scheme specific to the second device type; receiving, by a server, a request to access the service, the request including a device type identifier of a device requesting the service; extracting the device type identifier from the request; determining whether the device type identifier corresponds to the first device type or the second device type; selecting the first authentication module if the device type identifier corresponds to the first device type, and selecting the second authentication module if the device type identifier corresponds to the second device type; authenticating the request using the selected authentication module to determine whether the requesting device is permitted to access the service, thereby performing authentication of the requesting device using the authentication scheme specific to the requesting device; and providing access to the service when the selected authentication module determines that the requesting device is authorized to access the service, and preventing access to the service when the selected authentication module determines that the requesting device is not authorized to access the service. - View Dependent Claims (2)
-
-
3. A computer-implemented method for providing access to a service, comprising:
-
receiving a request to access a service, the request including a device type identifier of a device requesting access to the service; extracting the device type identifier from the request; determining a corresponding device type for the requesting device; selecting an authentication module from a plurality of authentication modules based on the device type identifier, the selected authentication module implementing an authentication scheme for the device type of the requesting device; authenticating the request using the selected authentication module to determine whether the requesting device is permitted to access the service; and providing access to the service based on at least a determination that the requesting device is authorized to access the service. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A server for providing access to a service, the server comprising:
-
a processor for executing program instructions; and a computer-readable medium storing the program instructions, the program instructions, when executed by the processor, performing a process to; receive a request to access a service, the request including a device type identifier of a device requesting access to the service; extract the device type identifier from the request; determine a corresponding device type for the requesting device; select an authentication module from a plurality of authentication modules based on the device type identifier, the selected authentication module implementing an authentication scheme for the device type of the requesting device; authenticate the request using the selected authentication module to determine whether the requesting device is permitted to access the service; and provide access to the service based on at least a determination that the requesting device is authorized to access the service. - View Dependent Claims (13)
-
-
14. A computer-readable medium storing program instructions for performing a method executed by a processor, the method providing access to a service and comprising steps performed by the processor of:
-
receiving a request to access a service, the request including a device type identifier of a device requesting access to the service; extracting the device type identifier from the request; determining a corresponding device type for the requesting device; selecting an authentication module from a plurality of authentication modules based on the device type identifier, the selected authentication module implementing an authentication scheme for the device type of the requesting device; authenticating the request using the selected authentication module to determine whether the requesting device is permitted to access the service; and providing access to the service based on at least a determination that the requesting device is authorized to access the service. - View Dependent Claims (15)
-
Specification