Verification of server authorization to provide network resources
First Claim
1. A method of verifying that a server is authorized to provide resources to a client, the method comprising acts of:
- generating a server authentication request at the client to verify that the server is authorized to provide at least one resource to the client;
transmitting the server authentication request to the server;
receiving an encrypted server authentication response from the server;
decrypting the server authentication response without user interaction in order to prevent a user from colluding with an unauthorized server to circumvent server authentication; and
disabling one or more client functions unless the decrypted server authentication response indicates that the server is authorized to provide the at least one resource to the client.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for verifying the authorization of a server to provide network resources to a client. At selected times, the client asserts an authorization interrupt, which will disable some or all non-essential functions of the client unless the server'"'"'s authorization is verified within an allotted period of time. The client creates a client message by generating a random number and combining it with a client identifier and a value that specifies the current time. The client message is encrypted and sent to the server. Only authorized servers can decrypt the client message and create an encrypted service message that includes the random number. The service message can also contain an authorization code specifying the services that the client may receive, and an expiration count indicating when the authorization procedure will be repeated. The client receives and decrypts the service message. If the random number in the service message is found to be the same as the random number in the client message, the server is authorized, and the client is enabled to exhibit a selected level of functionality. The client can be associated with a smart card or another intelligent peripheral that verifies the authorization of the server in behalf of the client.
-
Citations
20 Claims
-
1. A method of verifying that a server is authorized to provide resources to a client, the method comprising acts of:
-
generating a server authentication request at the client to verify that the server is authorized to provide at least one resource to the client;
transmitting the server authentication request to the server;
receiving an encrypted server authentication response from the server;
decrypting the server authentication response without user interaction in order to prevent a user from colluding with an unauthorized server to circumvent server authentication; and
disabling one or more client functions unless the decrypted server authentication response indicates that the server is authorized to provide the at least one resource to the client. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of verifying that a server is authorized to provide resources to a client, the method comprising acts of:
-
generating a server authentication request at the client, the server authentication request being encrypted with one or more encryption keys such that only an authorized server is able to decrypt the server authentication request;
transmitting the server authentication request to the server;
determining that no response to the server authentication request has been received by the client after an allotted period of time;
interpreting no response as an indication that the server is not authorized to provide resources to the client; and
disabling one or more client functions. - View Dependent Claims (8, 9, 10)
-
-
11. A computer program product for implementing a method of verifying that a server is authorized to provide resources to a client, the computer program product comprising a computer readable medium carrying computer executable instructions that implement the method, wherein the method comprises acts of:
-
generating a server authentication request at the client to verify that the server is authorized to provide at least one resource to the client;
transmitting the server authentication request to the server;
receiving an encrypted server authentication response from the server;
using a decryption key encoded in hardware at the client system to decrypt the server authentication response in order to prevent rogue software or operators of the client system from colluding with the server to circumvent server authentication; and
disabling one or more client functions unless the decrypted server authentication response indicates that the server is authorized to provide the at least one resource to the client. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computer program product for implementing a method of verifying that a server is authorized to provide resources to a client, the computer program product comprising a computer readable medium carrying computer executable instructions that implement the method, wherein the method comprises acts of:
-
generating a server authentication request at the client;
transmitting the server authentication request to the server;
determining that no response to the server authentication request has been received by the client after an allotted period of time;
interpreting no response as an indication that the server is not authorized to provide resources to the client; and
disabling one or more client functions. - View Dependent Claims (18, 19, 20)
-
Specification