System and method for strong access control to a network
First Claim
1. A method for strong access control to a network, the method comprising the following steps:
- (a) coupling an authentication device to a network;
(b) transmitting an initial response;
(c) generating a network response upon receipt of the initial response;
(d) comparing the initial response and the network response;
(e) authenticating the authentication device if the initial response and network response match, and not authenticating the authentication device if the initial response and network response do not match;
(f) providing access to network resources upon authentication of the authentication device;
(g) transmitting a subsequent response for accessing subsequent network resources;
(h) comparing the subsequent response to a subsequent network response;
(i) authenticating the authentication device if the subsequent response and subsequent network response match, and not authenticating the authentication device if the subsequent response and subsequent network do not match; and
(j) providing access to subsequent network resources upon authentication of the authentication device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for strong access control to a network is provided. An access control server and authentication device are provided for controlling access to a network. The access controlled by the access control server may include network protocols, network resources, and electronic devices that may be coupled to the network. Network resources may include data stored on the network. The access control server may grant access to the network to a user based upon a correct response received from an authentication device assigned to the user. The user may be able to access only selected data that may be determined by an access level assigned to the authentication device. Upon authentication, the authentication device must remain active to maintain a network session. The authentication device becomes inactive when it is deactivated, uncoupled from the network, or in any mode in which the device cannot produce a response to the access control server. The network session ends when it is determined that the authentication device is inactive.
57 Citations
12 Claims
-
1. A method for strong access control to a network, the method comprising the following steps:
-
(a) coupling an authentication device to a network; (b) transmitting an initial response; (c) generating a network response upon receipt of the initial response; (d) comparing the initial response and the network response; (e) authenticating the authentication device if the initial response and network response match, and not authenticating the authentication device if the initial response and network response do not match; (f) providing access to network resources upon authentication of the authentication device; (g) transmitting a subsequent response for accessing subsequent network resources; (h) comparing the subsequent response to a subsequent network response; (i) authenticating the authentication device if the subsequent response and subsequent network response match, and not authenticating the authentication device if the subsequent response and subsequent network do not match; and (j) providing access to subsequent network resources upon authentication of the authentication device. - View Dependent Claims (2, 3, 4)
-
-
5. A method for strong access control to a network, the method comprising the following steps:
-
(a) coupling an authentication device to a network; (b) generating an access request for accessing network resources; (c) generating a challenge upon receipt of the access request; (d) generating an initial response upon receipt of the challenge; (e) generating an initial network response upon receipt of the initial response; (f) comparing the initial response and initial network response; (g) authenticating the authentication device if the initial response and initial network response match, and not authenticating the authentication device if the initial response and initial network response do not match; (h) providing limited access to network resources to the authentication device upon authentication of the authentication device; (i) transmitting a subsequent access request for accessing subsequent network resources; (j) generating a subsequent network response upon receipt of the subsequent access request; (k) comparing the subsequent access request and subsequent network response; (l) authenticating the authentication device if the subsequent access request and subsequent network response match, and not authenticating the authentication device if the subsequent access request and subsequent network response do not match; and (m) providing limited access to subsequent network resources upon authentication of the authentication device. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12)
-
Specification