×

Methods and apparatus for user authentication and interactive unit authentication

  • US 7,624,437 B1
  • Filed: 05/01/2002
  • Issued: 11/24/2009
  • Est. Priority Date: 04/02/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method, comprising:

  • establishing a connection between a virtual private network (VPN) hardware client and an internet;

    establishing a connection between a client computer and the internet, where the connection passes through the VPN hardware client;

    establishing a tunnel between the client computer and a remote network upon successfully authenticating the virtual private network (VPN) hardware client to the remote network, where the VPN hardware client is operably connected to and remote to the client computer, and where the VPN hardware client is a hardware device,where authenticating the VPN hardware client comprises;

    receiving an initial data request from a client computing device;

    sending a web page containing a first query for authentication information to said client computing device in response to said initial data request;

    receiving first authentication information in response to said first query; and

    verifying said first authentication information, and wherein the step of providing the client computing device authentication mechanism comprises;

    returning, in response to verifying the first authentication information, a web page containing a query for client authentication information to said client computing device, the web page including information about the status of the secure data connection;

    receiving client authentication information from said client computing device; and

    verifying said client authentication information;

    controlling the VPN hardware client to provide two different levels of access to a user of the client computer, where a first level of access provides access to the internet to an unauthenticated user of the client computer, and where a second level of access provides access to both the internet and to the remote network to a user of the client computer that has been authenticated to the remote network through the tunnel;

    examining all data requests received by the VPN hardware client both before the VPN hardware client has been authenticated to the remote network and after the VPN hardware client has been authenticated to the remote network; and

    selectively allowing data requests seeking access to the tunnel, where data requests seeking access to the tunnel will be granted access to the tunnel when the data requests are either data requests that do not require that they originate from an authenticated user of the client computer or are data requests from an authenticated user of the client computer.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×