Just-in-time authentication of users of a digital home network
First Claim
Patent Images
1. A network comprising:
- network nodes; and
a system distributed over the network nodes within which, on first access to a first access-protected object of the system an authentication is provided,wherein the authentication is valid during a validity duration at least for allowing a further access to a second access-protected object including an application,wherein the validity duration is dependent on a duration of access to the first access-protected object and/or on context of use of the system, andwherein, after expiration of the validity duration, the authentication is maintained for actions within the application and is revoked for acts outside the application.
1 Assignment
0 Petitions
Accused Products
Abstract
A network has network nodes and a software system distributed over the network nodes within which, on first access to an access-protected object of the system, an authentication of the user is provided. The authentication is valid at least for a further access to an access-protected object. The duration of the validity of the authentication is dependent on the duration of access to the access-protected object and/or on the context of the use of the system.
-
Citations
15 Claims
-
1. A network comprising:
-
network nodes; and a system distributed over the network nodes within which, on first access to a first access-protected object of the system an authentication is provided, wherein the authentication is valid during a validity duration at least for allowing a further access to a second access-protected object including an application, wherein the validity duration is dependent on a duration of access to the first access-protected object and/or on context of use of the system, and wherein, after expiration of the validity duration, the authentication is maintained for actions within the application and is revoked for acts outside the application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of authenticating a user within a network with network nodes and a system distributed over the network nodes, the method comprising:
-
providing authentication of a user upon a first access by the user to an access-protected object of the system, the access-protected object including an application, wherein a duration of validity of the authentication is dependent on a duration of access to the system and on a context of use of the system; and after expiration of the validity duration, maintaining the authentication for actions within the application while revoking the authentication for acts outside the application. - View Dependent Claims (9, 10)
-
-
11. A security system comprising a computer and an authentication manager configured for causing the computer to:
-
provide access rights to a first protected object and a second protected object upon authentication of a user having rights for access to said first protected object and said second protected object; revoke said access rights to said first protected object upon expiration of a time period; and maintain said access rights to said second protected object after said expiration of said time period. - View Dependent Claims (12, 13, 14, 15)
-
Specification