System and method for enforcing a policy for an authenticator device
First Claim
Patent Images
1. A method comprising:
- defining at least one authenticator device authentication policy through an administration interface;
at a policy engine, initializing authentication policy processing for an authenticator device;
collecting an authenticator device status assessment;
evaluating policy compliance of the authenticator device status assessment to an associated defined device authentication policy; and
enforcing use of the authenticator device according to the policy compliance comprising;
if the policy compliance indicates the authenticator device status assessment is in compliance with the authenticator device authentication policy, allowing the authenticator device to be used in authenticating a primary client device, wherein the primary client device is distinct from the authenticator device; and
if the policy compliance indicates the authenticator device status assessment is not in compliance with the authenticator device authentication policy, preventing the authenticator device to be used in authenticating the primary client device.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method including defining at least one device authentication policy; at a policy engine, initializing authentication policy processing for an authenticator device; collecting device status assessment; evaluating policy compliance of the device status assessment to an associated defined device authentication policy; and enforcing use of the authenticator device according to the policy compliance.
69 Citations
18 Claims
-
1. A method comprising:
-
defining at least one authenticator device authentication policy through an administration interface; at a policy engine, initializing authentication policy processing for an authenticator device; collecting an authenticator device status assessment; evaluating policy compliance of the authenticator device status assessment to an associated defined device authentication policy; and enforcing use of the authenticator device according to the policy compliance comprising; if the policy compliance indicates the authenticator device status assessment is in compliance with the authenticator device authentication policy, allowing the authenticator device to be used in authenticating a primary client device, wherein the primary client device is distinct from the authenticator device; and if the policy compliance indicates the authenticator device status assessment is not in compliance with the authenticator device authentication policy, preventing the authenticator device to be used in authenticating the primary client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification