COMPOSITE SECURITY IDENTIFIER
First Claim
1. A method, comprising:
- receiving a composite security identifier associated with a remote device in a local device, wherein a plurality of identification codes associated with said remote device are encoded in said composite security identifier;
receiving an access request from said remote device in said local device;
associating said access request with a first one of said plurality of identification codes;
challenging said remote device for a second one of said plurality of identification codes different than said first one of said plurality of identification codes;
setting an access level for said remote device on said local device based on said composite security identifier and said challenging of said remote device; and
selectively executing or denying said access request based on said access level.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes receiving a composite security identifier associated with a remote device in a local device. A plurality of identification codes associated with the remote device are encoded in the composite security identifier. An access request from the remote device is received in the local device. The access request is associated with a first one of the plurality of identification codes. The remote device is challenged for a second one of the plurality of identification codes different than the first one of the identification codes. An access level for the remote device is set on the local device based on the composite security identifier and the challenging of the remote device. The access request is selectively executed or denied based on the access level.
15 Citations
20 Claims
-
1. A method, comprising:
-
receiving a composite security identifier associated with a remote device in a local device, wherein a plurality of identification codes associated with said remote device are encoded in said composite security identifier; receiving an access request from said remote device in said local device; associating said access request with a first one of said plurality of identification codes; challenging said remote device for a second one of said plurality of identification codes different than said first one of said plurality of identification codes; setting an access level for said remote device on said local device based on said composite security identifier and said challenging of said remote device; and selectively executing or denying said access request based on said access level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A device, comprising:
-
a memory to store a composite security identifier associated with a remote device, wherein a plurality of identification codes associated with said remote device are encoded in said composite security identifier; and a processor to receive an access request from said remote device, associate said access request with a first one of said plurality of identification codes, challenge said remote device for a second one of said plurality of identification codes different than said first one of said plurality of identification codes, set an access level for said remote device based on said composite security identifier and said challenging of said remote device, and selectively execute or deny said access request based on said access level. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification