Authentication of HTTP applications
First Claim
Patent Images
1. A method of authentication, the method comprising:
- connecting a wireless network to an HTTP network using an HTTP proxy;
converting wireless network protocols from the wireless network into a protocol supported by the HTTP network;
comparing information, consisting of header types, a header order, and a header content, of a request by client logic with a known pattern of information for the client logic to determine whether a device making the request is authorized to receive at least one of content and software, the comparing accomplished by the HTTP proxy, wherein the header types, the header order, and the header content strongly identify the client logic; and
when the information of the request matches the known pattern, causing the at least one of content and software to be communicated to the client logic in response to the request.
6 Assignments
0 Petitions
Accused Products
Abstract
An apparatus such as an HTTP proxy server compares information of a request by HTTP client logic with a known pattern of information for the client logic. When the information of the request matches the known pattern, the HTTP proxy server causes content and/or software to be communicated to the client in response to the request. Depending upon the results of the comparison, the HTTP proxy may also validate or invalidate the request before communicating it to the server.
-
Citations
18 Claims
-
1. A method of authentication, the method comprising:
-
connecting a wireless network to an HTTP network using an HTTP proxy; converting wireless network protocols from the wireless network into a protocol supported by the HTTP network; comparing information, consisting of header types, a header order, and a header content, of a request by client logic with a known pattern of information for the client logic to determine whether a device making the request is authorized to receive at least one of content and software, the comparing accomplished by the HTTP proxy, wherein the header types, the header order, and the header content strongly identify the client logic; and when the information of the request matches the known pattern, causing the at least one of content and software to be communicated to the client logic in response to the request. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus for authentication, the apparatus comprising:
-
a processor; and logic that, when applied to the processor, results in connecting a wireless network to an HTTP network;
converting wireless network protocols from the wireless network into a protocol supported by the HTTP network;
comparing information, consisting of header types, a header order, and a header content, of a request by client logic with a known pattern of information for the client logic to determine whether a device making the request is authorized to receive at least one of content and software, wherein the header types, the header order, and the header content strongly identify the client logic; and
when the information of the request matches the known pattern, causing the at least one of content and software to be communicated to the client logic in response to the request. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method of authentication, the method comprising:
-
connecting a wireless network to an HTTP network using an HTTP proxy; converting wireless network protocols from the wireless network into a protocol supported by the HTTP network; comparing information, consisting of header types, a header order, and a header content, of a request by client logic with a known pattern of information for the client logic to determine whether a device making the request is authorized to receive at least one of content and software, the comparing accomplished by the HTTP proxy, wherein the header types, the header order, and the header content strongly identify the client logic; and modifying the request information to either validate or invalidate the request according to whether the information of the request matches the known pattern. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification