Security architecture
First Claim
Patent Images
1. An apparatus comprising:
- at least a first application;
an authentication component configured to authenticate a communicating device;
an access control component accessible in response to a communicating device requesting access to the first application without the communicating device having been authenticated by the authentication component, and arranged to arbitrate whether access of the communicating device to the first application is granted or refused wherein the access control component is configured to instruct the authentication component to authenticate the communicating device if the access control component determines, based on at least one of stored application security level data and stored device security level data, that authentication is required, wherein the access control component is configured to receive indications originating from the communicating device identifying the communicating device and the application requested; and
wherein the authentication component is configured to authenticate the communicating device by verifying an identity of the communicating device or by verifying a personal identification number.
3 Assignments
0 Petitions
Accused Products
Abstract
A device for communicating with other devices to allow them to access applications, comprises: at least a first application; authentication means for authenticating a communicating device; and access control means accessible by a communicating device requesting access to the first application without the communicating device having been authenticated by the authentication means. The device is further arranged to arbitrate whether access of the communicating device to the first application is granted or refused wherein if the arbitration requires an authentication of the communicating device, the access control means instructs the authentication means to authenticate the communicating device.
16 Citations
27 Claims
-
1. An apparatus comprising:
-
at least a first application; an authentication component configured to authenticate a communicating device; an access control component accessible in response to a communicating device requesting access to the first application without the communicating device having been authenticated by the authentication component, and arranged to arbitrate whether access of the communicating device to the first application is granted or refused wherein the access control component is configured to instruct the authentication component to authenticate the communicating device if the access control component determines, based on at least one of stored application security level data and stored device security level data, that authentication is required, wherein the access control component is configured to receive indications originating from the communicating device identifying the communicating device and the application requested; and wherein the authentication component is configured to authenticate the communicating device by verifying an identity of the communicating device or by verifying a personal identification number. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
at least first and second applications; an authentication component configured to authenticate a communicating device; and an access control component, wherein the access control component is configured to exchange signals with a first multiplexing protocol layer, the first multiplexing protocol layer is accessible by a communicating device requesting access to the first application without the communicating device having been authenticated by the authentication component, the access control component is configured to arbitrate whether access of the communicating device to the first application is granted or refused, the access control component is configured to instruct the authentication component to authenticate the communicating device after determining, based on at least one of stored application security level data and stored device security level data, that authentication is required, the access control component is configured to exchange signals with a second multiplexing protocol layer, the second multiplexing protocol layer is accessible by a communicating device requesting access to the second application without that communicating device having been authenticated by the authentication component, the access control component is configured to arbitrate whether access to the second application, by the communicating device requesting access to the second application, is granted or refused, the access control component is configured to instruct the authentication component to authenticate the communicating device requesting access to the second application after determining, based on at least one of stored application security level data and stored device security level data, that authentication is required, the first multiplexing protocol layer is accessible by the communicating device requesting access to the second application without that communicating device having been authenticated by the authentication component, and is arranged to provide that communicating device access to the second multiplexing protocol layer, and the authentication component is configured to authenticate the communicating device requesting access to the second application by verifying an identity of that communicating device or by verifying a personal identification number. - View Dependent Claims (9, 10, 11)
-
-
12. An apparatus comprising:
-
a processor; and a memory having stored therein machine executable instructions, that when executed, cause the apparatus to; receive, from a requesting device, a request at the apparatus and passing it, without authenticating the requesting device, to an arbitration component; arbitrate, in the arbitration component, whether to grant or refuse access to a first application to the requesting device, the arbitration including a determination, on the basis of at least one of the identity of first application and the identity of the requesting device, of whether an authentication of the requesting device is required, if authentication is required, perform the authentication during the arbitration, wherein the authentication includes verifying an identity of the requesting device or verifying a personal identification number. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A method comprising:
-
receiving, by a providing device, a request to access an application and passing it, without authenticating a requesting device, to an arbitration component interfacing with the application; determining, by the providing device, in the arbitration component, whether to grant or refuse access to the application, said determining including an authentication of the requesting device, said authentication performed during the determination, wherein the determination is made on the basis of the identity of the application requested; and wherein authentication includes verifying an identity of the requesting device or verifying a personal identification number. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A non-transitory machine accessible and computer readable storage medium encoded with instructions that, when executed by a processor, cause the processor to perform:
-
receiving a request to access an application and passing it, without authenticating a requesting device, to an arbitration component interfacing with the application; determining, in the arbitration component, whether to grant or refuse access to the application, said determining including an authentication of the requesting device, said authentication performed during the determination, wherein the determination is made on the basis of the identity of the application requested; and wherein authentication includes verifying an identity of the requesting device or verifying a personal identification number. - View Dependent Claims (27)
-
Specification