Authenticating a device with a server over a network
First Claim
1. A method of authenticating a device with a server over a network, the method comprising the steps of:
- establishing, by the device, a secure connection with the server;
communicating, by the device, identification information of the device to the server, wherein the identification information uniquely identifies the device to the server and is pre-stored in the device;
determining, by the server, the credibility of the device using the identification information communicated by the device; and
in a case where the server determines that the device is credible;
creating, by the server, a first authentication token for the device, the first authentication token indicating that the device is credible;
storing, by the server, the first authentication token;
transferring, by the server, the first authentication token to the device using the secure connection; and
storing, by the device, the first authentication token;
wherein the method further comprises the steps of;
establishing, by the device, a secure re-connection with the server; and
authenticating, by the server and over the secure re-connection, the device using the first authentication token stored by the device.
1 Assignment
0 Petitions
Accused Products
Abstract
The authentication of a device with a server over a network includes authenticating, by the device, the server so as to establish a secure connection with the server. The device communicates identification information of the device to the server, wherein the identification information uniquely identifies the device to the server. The server determines the credibility of the device using the identification information communicated by the device. In a case where the server determines that the device is credible, the server creates a first authentication token for the device, stores the first authentication token, and transfers the first authentication token to the device using the secure connection, and the device stores the first authentication token. The server authenticates the device using the first authentication token.
-
Citations
28 Claims
-
1. A method of authenticating a device with a server over a network, the method comprising the steps of:
-
establishing, by the device, a secure connection with the server; communicating, by the device, identification information of the device to the server, wherein the identification information uniquely identifies the device to the server and is pre-stored in the device; determining, by the server, the credibility of the device using the identification information communicated by the device; and in a case where the server determines that the device is credible; creating, by the server, a first authentication token for the device, the first authentication token indicating that the device is credible; storing, by the server, the first authentication token; transferring, by the server, the first authentication token to the device using the secure connection; and storing, by the device, the first authentication token; wherein the method further comprises the steps of; establishing, by the device, a secure re-connection with the server; and authenticating, by the server and over the secure re-connection, the device using the first authentication token stored by the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer readable memory medium on which is stored computer executable process steps for causing a computer to authenticate a device with a server over a network, the process steps comprising:
-
establishing, by the device, a secure connection with the server; communicating, by the device, identification information of the device to the server, wherein the identification information uniquely identifies the device to the server and is pre-stored in the device; determining, by the server, the credibility of the device using the identification information communicated by the device; and in a case where the server determines that the device is credible; creating, by the server, a first authentication token for the device, the first authentication token indicating that the device is credible; storing, by the server, the first authentication token; transferring, by the server, the first authentication token to the device using the secure connection; and storing, by the device, the first authentication token; wherein the process steps further comprise; establishing, by the device, a secure re-connection with the server; and authenticating, by the server and over the secure re-connection, the device using the first authentication token stored by the devices. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A device for authentication by a server over a network, the device comprising:
-
a computer readable memory which stores computer executable process steps; and a processor constructed to execute the computer executable process steps stored in the memory; wherein the computer executable process steps comprise; establishing by the device a secure connection with the server; communicating identification information of the device to the server, wherein the identification information uniquely identifies the device to the server and is pre-stored in the device; receiving a first authentication token from the server, the first authentication token indicating that the device is credible; storing the first authentication token; establishing by the device a secure re-connection with the server; and authenticating the device to the server over the secure re-connection using the first authentication token stored by the device. - View Dependent Claims (21)
-
-
22. A server for authenticating a device over a network, the server comprising:
-
a computer readable memory which stores computer executable process steps; and a processor constructed to execute the computer executable process steps stored in the memory; wherein the computer executable process steps comprise; establishing a secure connection between the device and the server; receiving identification information from the device, wherein the identification information uniquely identifies the device to the server and is pre-stored in the device; determining the credibility of the device using the identification information; and in a case where it is determined that the device is credible; creating a first authentication token for the device, the first authentication token indicating that the device is credible; storing the first authentication token; and transferring the first authentication token to the device using the secure connection; wherein the process steps further comprise; establishing a secure re-connection between the device and the server; and authenticating the device over the secure re-connection using the first authentication token stored by the device.
-
-
23. A method of authenticating a device with a server over a network, the method comprising the steps of:
-
establishing, by the device, a secure connection with the server; communicating, by the device, identification information of the device to the server, wherein the identification information uniquely identifies the device to the server and is pre-stored in the device; determining, by the server, the credibility of the device using the identification information communicated by the device; and in a case where the server determines that the device is credible; creating, by the server, a first authentication token for the device, the first authentication token indicating that the device is credible; storing, by the server, the first authentication token; transferring, by the server, the first authentication token to the device using the secure connection; and storing, by the device, the first authentication token; wherein the method further comprises the steps of; establishing, by the device, a re-connection with the server; and authenticating, by the server and over the re-connection, the device using the first authentication token stored by the device. - View Dependent Claims (24)
-
-
25. A non-transitory computer readable memory medium on which is stored computer executable process steps for causing a computer to authenticate a device with a server over a network, the process steps comprising:
-
establishing, by the device, a secure connection with the server; communicating, by the device, identification information of the device to the server, wherein the identification information uniquely identifies the device to the server and is pre-stored in the device; determining, by the server, the credibility of the device using the identification information communicated by the device; and in a case where the server determines that the device is credible; creating, by the server, a first authentication token for the device, the first authentication token indicating that the device is credible; storing, by the server, the first authentication token; transferring, by the server, the first authentication token to the device using the secure connection; and storing, by the device, the first authentication token; wherein the process steps further comprise; establishing, by the device, a re-connection with the server; and authenticating, by the server and over the re-connection, the device using the first authentication token stored by the devices. - View Dependent Claims (26)
-
-
27. A device for authentication by a server over a network, the device comprising:
-
a computer readable memory which stores computer executable process steps; and a processor constructed to execute the computer executable process steps stored in the memory; wherein the computer executable process steps comprise; establishing by the device a secure connection with the server; communicating identification information of the device to the server, wherein the identification information uniquely identifies the device to the server and is pre-stored in the device; receiving a first authentication token from the server, the first authentication token indicating that the device is credible; storing the first authentication token; establishing by the device a re-connection with the server; and authenticating the device to the server over the re-connection using the first authentication token stored by the device. - View Dependent Claims (28)
-
Specification