Hardware-Based Credential Distribution
First Claim
Patent Images
1. A system comprising:
- a network interface configured to communicate data over a network;
one or more processors; and
a memory coupled to the one or more processors and including processor-executable instructions that, responsive to execution by the one or more processors, implement a resource access manager to;
receive, via the network interface, a resource access request from a remote entity, the resource access request including a unique identifier of the remote entity and a hardware profile of the remote entity;
determine that the hardware profile matches at least a portion of a stored hardware profile associated with the unique identifier;
determine that a frequency of credential distribution associated with the unique identifier of the remote entity does not exceed a credential distribution frequency limit; and
transmit, via the network interface and responsive to determining that the credential distribution frequency limit has not been exceeded, a credential to the remote entity useful to access a resource.
3 Assignments
0 Petitions
Accused Products
Abstract
This document describes various techniques for distributing credentials based on hardware profiles. A resource access request including a hardware profile is transmitted to a remote entity having access to a previous hardware profile and a credential useful to access a resource is received if at least a portion of the hardware profile matches the previous hardware profile.
-
Citations
20 Claims
-
1. A system comprising:
-
a network interface configured to communicate data over a network; one or more processors; and a memory coupled to the one or more processors and including processor-executable instructions that, responsive to execution by the one or more processors, implement a resource access manager to; receive, via the network interface, a resource access request from a remote entity, the resource access request including a unique identifier of the remote entity and a hardware profile of the remote entity; determine that the hardware profile matches at least a portion of a stored hardware profile associated with the unique identifier; determine that a frequency of credential distribution associated with the unique identifier of the remote entity does not exceed a credential distribution frequency limit; and transmit, via the network interface and responsive to determining that the credential distribution frequency limit has not been exceeded, a credential to the remote entity useful to access a resource. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving, via a network interface, a resource access request from a remote entity, the resource access request including a unique identifier of the remote entity and a hardware profile of the remote entity; determining that the hardware profile matches at least a portion of a stored hardware profile associated with the unique identifier; determining that a frequency of credential distribution associated with the unique identifier of the remote entity does not exceed a credential distribution frequency limit; and transmitting, via the network interface and responsive to determining that the credential distribution frequency limit has not been exceeded, a credential to the remote entity useful to access a resource. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. One or more computer-readable storage devices comprising processor-executable instructions that, responsive to execution by one or more processors, implement a resource access manager to:
-
receive, via a network interface, a resource access request from a remote entity, the resource access request including a unique identifier of the remote entity and a hardware profile of the remote entity; determine that the hardware profile matches at least a portion of a stored hardware profile associated with the unique identifier; determine that a frequency of credential distribution associated with the unique identifier of the remote entity does not exceed a credential distribution frequency limit; and transmit, via the network interface and responsive to determining that the credential distribution frequency limit associated with the unique identifier of the remote entity has not been exceeded, a credential to the remote entity useful to access a resource. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification