Device-Specific Authentication Credentials
First Claim
Patent Images
1. A method performed by one or more data processing apparatuses, the method comprising:
- generating device-specific credentials, wherein the device-specific credentials are configured to be used more than one time by an associated device;
associating the device-specific credentials with a device;
associating a particular user of the device with user-specific credentials different than the device-specific credentials;
after generating the device-specific credentials, associating the device-specific credentials with the device, and associating the particular user with the user-specific credentials, authenticating, by a data processing apparatus connected to a first network, the device based on the device-specific credentials, wherein the authentication occurs within the first network;
after authenticating the device;
permitting the device to access a second network different than the first network; and
authenticating, by a data processing apparatus connected to the second network, the particular user of the device based on the user-specific credentials.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for providing device-specific authentication are described. One example method includes generating device-specific credentials, associating the device-specific credentials with a device, authenticating the device based on the device-specific credentials, and after authenticating the device, authenticating a user of the device based on user-specific credentials associated with the user and different than the device-specific credentials.
31 Citations
30 Claims
-
1. A method performed by one or more data processing apparatuses, the method comprising:
-
generating device-specific credentials, wherein the device-specific credentials are configured to be used more than one time by an associated device; associating the device-specific credentials with a device; associating a particular user of the device with user-specific credentials different than the device-specific credentials; after generating the device-specific credentials, associating the device-specific credentials with the device, and associating the particular user with the user-specific credentials, authenticating, by a data processing apparatus connected to a first network, the device based on the device-specific credentials, wherein the authentication occurs within the first network; after authenticating the device; permitting the device to access a second network different than the first network; and authenticating, by a data processing apparatus connected to the second network, the particular user of the device based on the user-specific credentials. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method performed by one or more data processing apparatuses, the method comprising:
-
authenticating, by a data processing apparatus connected to a first network, a first device based on a first set of device-specific credentials, wherein the authentication occurs within the first network; after authenticating the first device, permitting the first device to access a second network different than the first network; authenticating, by a data processing apparatus connected to the second network, a user based on user-specific credentials associated with the user and different than the first set of device-specific credentials, wherein the authentication occurs while the user is using the first device and occurs within the second network, wherein the user-specific credentials include a username and password; applying a first policy associated with the first device to the user while the user is using the first device; authenticating, by the data processing apparatus connected to the first network, a second device based on a second set of device-specific credentials, wherein the authentication occurs within the first network; after authenticating the second device, permitting the second device to access the second network; authenticating, by the data processing apparatus connected to the second network, the user based on the user-specific credentials, the user-specific credentials being different than the second set of device-specific credentials, wherein the authentication occurs while the user is using the second device and occurs within the second network; and applying a second policy associated with the second device to the user while the user is using the second device, the second policy being different than the first policy. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
a hardware processor configured to execute computer program instructions; and a non-transitory computer storage medium encoded with computer program instructions that, when executed by the processor, cause the system to perform operations comprising; generating device-specific credentials; associating the device-specific credentials with a device; authenticating, by a data processing apparatus connected to a first network, the device based on the device-specific credentials, wherein the authentication occurs within the first network; after authenticating the device; permitting the device to access a first portion of a second network different than the first network; authenticating, by a data processing apparatus connected to the first portion of the second network, the particular user of the device based on the user-specific credentials; and in response to authenticating the particular user, permitting the device to access a second portion of the second network different than the first portion. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A system comprising:
-
a hardware processor configured to execute computer program instructions; and a non-transitory computer storage medium encoded with computer program instructions that, when executed by the processor, cause the system to perform operations comprising; authenticating a first device based on a first set of device-specific credentials, wherein the authentication occurs within a first network; after authenticating the first device, permitting the first device to access a second network different than the first network; authenticating a user based on user-specific credentials associated with the user and different than the first set of device-specific credentials, wherein the authentication occurs while the user is using the first device and occurs within the second network, wherein the user-specific credentials include a username and password; applying a first policy associated with the first device to the user while the user is using the first device; authenticating a second device based on a second set of device-specific credentials, wherein the authentication occurs within the first network; after authenticating the second device, permitting the second device to access the second network; authenticating the user based on the user-specific credentials, the user-specific credentials being different than the second set of device-specific credentials, wherein the authentication occurs while the user is using the second device and occurs within the second network; and applying a second policy associated with the second device to the user while the user is using the second device, the second policy being different than the first policy. - View Dependent Claims (27, 28, 29, 30)
-
Specification