EVALUATING A SECURITY STACK IN REPSONSE TO A REQUEST TO ACCESS A SERVICE
First Claim
1. A process to evaluate a request to access a service received from a computing device having a software stack and including a software stack provider over a network, the process comprising:
- determining from the computing device whether a set of conditions are met with the software stack prior to providing access to the service;
receiving verification information from the software stack if the set of conditions are claimed to be met;
requesting validation from the software stack provider using the verification information from the software stack if the set of conditions are claimed to be met with the software stack; and
providing access to the service if the software stack provider validates the set of conditions are met.
2 Assignments
0 Petitions
Accused Products
Abstract
A process to evaluate a request to access a service received from a user'"'"'s computing device having a software stack and a software stack provider over a computer network is disclosed. Prior to providing access to the service, a determination is made as to whether the software stack meets a set of conditions. If the set of conditions are met, the software stack provides verification information. The software stack provider is asked to validate the verification information. Access to the service if the software stack provider validates that the set of conditions are met.
-
Citations
20 Claims
-
1. A process to evaluate a request to access a service received from a computing device having a software stack and including a software stack provider over a network, the process comprising:
-
determining from the computing device whether a set of conditions are met with the software stack prior to providing access to the service; receiving verification information from the software stack if the set of conditions are claimed to be met; requesting validation from the software stack provider using the verification information from the software stack if the set of conditions are claimed to be met with the software stack; and providing access to the service if the software stack provider validates the set of conditions are met. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A process to evaluate a request to access a service received from a computing device having a software stack and including a software stack provider over a network, the process comprising:
-
in response to a request from the computing device to access the service, determining whether the software stack meets a set of conditions; if the software stack meets the set of conditions, receiving verification information from the software stack including the set of conditions the software stack claims to meet and an address of the software stack provider; requesting the software stack provider at the address determine to validate the verification information; and providing computing device access to the service if the software stack provider validates the verification information. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A process to evaluate a request a user'"'"'s computing device to access a service, wherein the user'"'"'s computing device includes a security software stack and including a software stack provider over a network, the process comprising:
-
in response to the request to access the service, providing a set of tags to be interpreted by the user'"'"'s computing device to determine whether the security software stack meets a set of conditions of the service; receiving a response to the tags from the user'"'"'s computing device, the response including verification information if the set of conditions are claimed to be met, wherein verification information includes the set of conditions claimed to be met and an address of the software stack provider; responding to the verification information by including a listener address of the service to be delivered to the software stack provider; requesting validation of the verification information from the software stack provider if the set of conditions are met wherein validation includes the software stack provider interrogating the software stack to determine whether the conditions are met and providing results of the validation to the service over the listener address; and providing access to the service if the software stack provider validates the set of conditions are met. - View Dependent Claims (20)
-
Specification