Hardware-based credential distribution
First Claim
Patent Images
1. A method comprising:
- receiving, at a server device, a resource access request from a remote entity, the resource access request including a unique identifier of the remote entity and a hardware profile of the remote entity;
determining that the hardware profile matches at least a portion of a stored hardware profile associated with the unique identifier;
determining that a credential distribution limit associated with the unique identifier of the remote entity has not been exceeded, the credential distribution limit limiting a number of credentials distributed by the server device;
incrementing a credential distribution count value associated with the unique identifier of the remote entity; and
transmitting, from the server device and responsive to determining that the credential distribution limit associated with the unique identifier has not been exceeded, a credential to the remote entity useful to access a resource.
3 Assignments
0 Petitions
Accused Products
Abstract
This document describes various techniques for distributing credentials based on hardware profiles. A resource access request including a hardware profile is transmitted to a remote entity having access to a previous hardware profile and a credential useful to access a resource is received if at least a portion of the hardware profile matches the previous hardware profile.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, at a server device, a resource access request from a remote entity, the resource access request including a unique identifier of the remote entity and a hardware profile of the remote entity; determining that the hardware profile matches at least a portion of a stored hardware profile associated with the unique identifier; determining that a credential distribution limit associated with the unique identifier of the remote entity has not been exceeded, the credential distribution limit limiting a number of credentials distributed by the server device; incrementing a credential distribution count value associated with the unique identifier of the remote entity; and transmitting, from the server device and responsive to determining that the credential distribution limit associated with the unique identifier has not been exceeded, a credential to the remote entity useful to access a resource. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving, at a server device hosting a resource, a request from a remote entity for access of the resource, the request including a unique identifier and a hardware profile of the remote entity; forwarding the unique identifier and the hardware profile to a request-validating entity having access to an historical hardware profile associated with the unique identifier; receiving an indication of a validity of the request if the hardware profile of the remote entity matches at least a portion of the historical hardware profile; determining that a frequency of credential distribution associated with the unique identifier of the remote entity does not exceed a credential distribution frequency limit, the credential distribution frequency limit limiting a frequency at which the server device distributes credentials associated with the unique identifier; and transmitting, from the server device and responsive to determining that the frequency of credential distribution does not exceed the credential distribution frequency limit, a credential to the remote entity effective to enable access of the resource. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
one or more processors; and a memory coupled to the one or more processors and including processor-executable instructions that, responsive to execution by the one or more processors, implement a resource access manager to; receive, via a network interface, a resource access request from a remote entity, the resource access request including a unique identifier of the remote entity and a hardware profile of the remote entity; determine that the hardware profile matches at least a portion of a stored hardware profile associated with the unique identifier; determine that a credential distribution limit associated with the unique identifier of the remote entity has not been exceeded, the credential distribution limit limiting a total number of credentials issued by the resource access manager in association with the unique identity of the remote entity; and transmit, via the network interface and responsive to determining that the credential distribution limit associated with the unique identifier of the remote entity has not been exceeded, a credential to the remote entity useful to access a resource. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification