SECURE INFORMATION DELIVERY
First Claim
Patent Images
1. A method comprising:
- receiving, by a first network device, a request for content from a user device;
determining, by the first network device, that the user device is not authenticated based on receiving the request for content from the user device;
sending, by the first network device, information to the user device that the user device requires authentication before the user device is authorized to receive the content from a plurality of content providers;
receiving, by the first network device, a notification from a second network device that the user device is authenticated based on the second network device determining that the user device is authorized to receive the content from the plurality of content providers;
generating, by the first network device, a secret key based on receiving the notification,the secret key permitting the user device to receive the content from the plurality of content providers;
authenticating, by the first network device, the user device by using the secret key generated by the first network device; and
sending, by the first network device, the content from the plurality of content providers to the user device, based on authenticating the user device with the secret key.
1 Assignment
0 Petitions
Accused Products
Abstract
A first network device is configured to receive a request for content from a user device, determine that the user device is not authenticated, and send information to the user device that the user device requires authentication. The first network device is configured further to receive a notification that the user device is authorized to receive content from multiple content providers. The first network device is configured further to generate a secret key and authenticate the user device by using the secret key. The first network device is further configured to send the content to the user device.
14 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a first network device, a request for content from a user device; determining, by the first network device, that the user device is not authenticated based on receiving the request for content from the user device; sending, by the first network device, information to the user device that the user device requires authentication before the user device is authorized to receive the content from a plurality of content providers; receiving, by the first network device, a notification from a second network device that the user device is authenticated based on the second network device determining that the user device is authorized to receive the content from the plurality of content providers; generating, by the first network device, a secret key based on receiving the notification, the secret key permitting the user device to receive the content from the plurality of content providers; authenticating, by the first network device, the user device by using the secret key generated by the first network device; and sending, by the first network device, the content from the plurality of content providers to the user device, based on authenticating the user device with the secret key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
a first network device to; receive a request for content from a user device; determine that the user device is not authenticated based on receiving the request for content from the user device; send information to the user device that the user device requires authentication before the user device is authorized to receive the content; receive a notification from a second network device that the user device is authenticated based on the second network device determining that the user device is authorized to receive information from multiple content providers; generate a secret key based on receiving the notification, the secret key permitting the user device to receive the content from the multiple content providers; authenticate the user device by using the secret key; and send the content to the user device based on authenticating the user device with the secret key. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
16. A computer-readable medium comprising:
a plurality of instructions that, when executed by one or more processors of a first network device, cause the one or more processors to; receive a request for content from a user device; determine that the user device is not authenticated based on receiving the request for content from the user device; send information to the user device that the user device requires authentication before the user device is authorized to receive the content from one or more of a plurality of content providers; receive a notification from a second network device that the user device is authenticated based on the second network device determining that the user device is authorized to receive the content from the one or more of the plurality of content providers; generate a secret key based on receiving the notification; the secret key permitting the user device to receive the content from the plurality of content providers; authenticate the user device by using the secret key generated by the first network device; and send the content to the user device, based on authenticating the user device with the secret key, from the one or more of the plurality of content providers. - View Dependent Claims (17, 18, 19, 20)
Specification