Identifying unauthorized communication systems using a system-specific identifier
First Claim
Patent Images
1. A method for determining whether a client communication system seeking access to a host communication system is authorized to do so, the method comprising:
- receiving, at the host, from the client communication system, a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed at the client on a first user-dependent access identifier and the user-independent client-communication-system-specific identifier;
accessing, at the host and based on the receipt of the user-independent client communication-system-specific identifier, a second user dependent access identifier;
performing a second mathematical computation using the accessed second user-dependent access identifier and the user-independent client-communication-system-specific identifier received from the client communication system;
comparing results of the first and second mathematical computations; and
designating a client communication system as unauthorized based on the comparison of the results of the first and second mathematical computations,wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system.
7 Assignments
0 Petitions
Accused Products
Abstract
An authorized client communication system seeking access to a host communication system may be identified by performing a mathematical computation on a client communication system-specific identifier and an access password. Communications from the client communication system are terminated if the result of the mathematical computation does not correspond to an authorized client communication system. Another aspect involves storing information about an authorized client communication system.
-
Citations
73 Claims
-
1. A method for determining whether a client communication system seeking access to a host communication system is authorized to do so, the method comprising:
-
receiving, at the host, from the client communication system, a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed at the client on a first user-dependent access identifier and the user-independent client-communication-system-specific identifier; accessing, at the host and based on the receipt of the user-independent client communication-system-specific identifier, a second user dependent access identifier; performing a second mathematical computation using the accessed second user-dependent access identifier and the user-independent client-communication-system-specific identifier received from the client communication system; comparing results of the first and second mathematical computations; and designating a client communication system as unauthorized based on the comparison of the results of the first and second mathematical computations, wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for handling information about an authorized client communication system, the method comprising:
-
storing a version of a user-dependent access identifier; storing a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed, at a client communication system, on the user-dependent access identifier and the user-independent client-communication-system-specific identifier; performing a second mathematical computation on the stored version of the user-dependent access identifier and the retrieved user-independent client-communication-system-specific identifier, and storing the results of the second mathematical computation, wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer readable medium or propagated signal having embodied thereon a computer program for identifying an unauthorized client communication system seeking access to a host communication system, the computer program comprising:
-
a performing code segment for performing a first mathematical computation on a first user-dependent access identifier and a user-independent client-communication-system-specific identifier; a receiving code segment for receiving, at the host, from the client communication system, a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed at the client on the first user-dependent access identifier and the user-independent client-communication-system-specific identifier; a receiving code segment for retrieving, at the host, a second user-dependent access identifier; a performing code segment for performing a second mathematical computation using the received second user-dependent access identifier and the user-independent client-communication-system-specific identifier received from the client communication system; comparing results of the first and second mathematical computations; and a designating code segment for designating a client communication system as unauthorized based on a results of the first and second mathematical computations, wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. A computer readable medium or propagated signal having embodied thereon a computer program for handling information about an authorized client communication system, the computer program comprising:
-
a user-dependent access identifier storing code segment for storing a version of a user-dependent access identifier; a storing code segment for storing, at the host, a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed on the user-dependent access identifier and the user-independent client-communication-system-specific identifier; a performing code segment for performing a second mathematical computation on the stored version of the user-dependent access identifier and the retrieved user-independent client-communication-system-specific identifier; and a computation storing code segment for storing the results of the second mathematical computations, wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system. - View Dependent Claims (41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
-
51. An apparatus for identifying an unauthorized client communication system seeking access to a host communication system, the apparatus comprising:
-
a performing device structured and arranged to perform, at a client, a first mathematical computation on a first user-dependent access identifier and a user-independent client-communication-system-specific identifier; a receiving device structured and arranged to receive, at the host, from the client communication system, a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed at the client on the first user-dependent access identifier and the user-independent client-communication-system-specific identifier; an accessing device structured and arranged to access, at the host, a second user-dependent access identifier; a performing device structured and arranged to perform a second mathematical computation using the accessed second user-dependent access identifier and the user-independent client-communication-system-specific identifier received from the client communication system; a comparing device structured and arranged to compare results of the first and second mathematical computations; and a designating device structured and arranged to designate a client communication system as unauthorized based on the results of the first and second mathematical computations, wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system. - View Dependent Claims (52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62)
-
-
63. An apparatus for handling information about an authorized client communication system, the apparatus comprising:
-
a user-dependent access identifier device structured and arranged to store a version of a first user-dependent access identifier; a receiving device structured and arranged to receive, at the host, from the client communication system, a user-independent client-communication-system-specific identifier and results of a first mathematical computation performed at the client on the first user-dependent access identifier and the user-independent client-communication-system-specific identifier; an accessing device structured and arranged to access, at the host, a second user-dependent access identifier; a performing device structured and arranged to perform a second mathematical computation using the accessed second user-dependent access identifier and the user-independent client-communication-system-specific identifier received from the client communication system; a comparing device structured and arranged to compare results of the first and second mathematical computations; and a designation device structured and arranged to designate a client communication system as unauthorized based on the comparison of the results of the first and second mathematical computations, and wherein the user-independent client-communication-system-specific identifier is derived from information that identifies at least a hardware component or aspect of the client communication system. - View Dependent Claims (64, 65, 66, 67, 68, 69, 70, 71, 72, 73)
-
Specification