METHOD OF AUTHORIZING AN OPERATION TO BE PERFORMED ON A TARGETED COMPUTING DEVICE
First Claim
Patent Images
1. A method of authorizing an operation to be performed on a targeted computing device, said method comprising:
- generating a request to perform an operation on the targeted computing device;
signing the request with a private key of a first private, public key pair;
transmitting the request to an authentication server;
receiving an authorization response from the authentication server that includes the request and an authorization token; and
transmitting the authorization response to the targeted computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authorizing an operation to be performed on a targeted computing device is provided. The method includes generating a request to perform an operation on the targeted computing device, signing the request with a private key of a first private, public key pair, transmitting the request to an authentication server, receiving an authorization response from the authentication server that includes the request and an authorization token, and transmitting the authorization response to the targeted computing device.
-
Citations
20 Claims
-
1. A method of authorizing an operation to be performed on a targeted computing device, said method comprising:
-
generating a request to perform an operation on the targeted computing device; signing the request with a private key of a first private, public key pair; transmitting the request to an authentication server; receiving an authorization response from the authentication server that includes the request and an authorization token; and transmitting the authorization response to the targeted computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of authorizing an operation to be performed on a targeted computing device, said method comprising:
-
receiving a request from a requesting device to perform an operation on the targeted computing device; verifying the request with a public key of a first private, public key pair, wherein the request is signed by a private key of the first private, public key pair; forming an authorization response that includes the request and an authorization token; and transmitting the authorization response to the requesting device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method of authorizing an operation to be performed on a targeted computing device, said method comprising:
-
receiving an authorization response from a requesting device, the authorization response including a request to perform an operation on the targeted computing device and an authorization token; verifying the authorization response with a public key of a private, public key pair, wherein the authorization response is signed by a private key of the private, public key pair; and granting authorization to perform the operation upon verification of the authorization response. - View Dependent Claims (18, 19, 20)
-
Specification