RESILIENT AND RESTORABLE DYNAMIC DEVICE IDENTIFICATION
First Claim
Patent Images
1. A method, comprising:
- receiving, via a network, a request to access a server, the request comprising a first device tag set;
when the first device tag set matches a previously assigned device tag set,allowing access to the server without requesting full access credentials of a user,invalidating the first device tag set, andsending a second device tag set; and
when the first device tag set does not match the previously assigned device tag set, requesting full access credentials from the user.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer system receives a request to access a server. The request includes a first device tag set. When the first device tag set matches a previously assigned device tag set, the computer system allows access to the server without requesting full access credentials of a user. The computer system invalidates the first device tag set, and sends a second device tag set. When the first device tag set does not match the previously assigned device tag set, the computer system requests full access credentials from the user.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, via a network, a request to access a server, the request comprising a first device tag set; when the first device tag set matches a previously assigned device tag set, allowing access to the server without requesting full access credentials of a user, invalidating the first device tag set, and sending a second device tag set; and when the first device tag set does not match the previously assigned device tag set, requesting full access credentials from the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system, comprising:
-
a memory; and a processing device coupled with the memory to; receive, via a network, a request to access a server, the request comprising a first device tag set; when the first device tag set matches a previously assigned device tag set, allow access to the server without requesting full access credentials of a user, invalidate the first device tag set, and send a second device tag set; and when the first device tag set does not match the previously assigned device tag set, request full access credentials from the user. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer readable storage medium including instructions that, when executed by a processing device, cause the processing device to:
-
receive, via a network, a request to access a server, the request comprising a first device tag set; when the first device tag set matches a previously assigned device tag set, allow access to the server without requesting full access credentials of a user, invalidate the first device tag set, and send a second device tag set; and when the first device tag set does not match the previously assigned device tag set, request full access credentials from the user. - View Dependent Claims (18, 19, 20)
-
Specification