×

Modular device authentication framework

  • US 8,813,186 B2
  • Filed: 09/29/2010
  • Issued: 08/19/2014
  • Est. Priority Date: 09/30/2009
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for providing access to a service, comprising:

  • storing authentication modules to authenticate devices requesting access to the service, the devices including at least a first plurality of devices having a first device type and a second plurality of devices having a second device type;

    configuring a first one of the authentication modules to perform authentication of the first plurality of devices using an authentication scheme specific to the first device type;

    configuring a second one of the authentication modules to perform authentication of the second plurality of devices using an authentication scheme specific to the second device type;

    configuring a third one of the authentication modules to receive requests corresponding to a third device type, wherein the third one of the authentication modules forwards requests corresponding to the third device type to a trusted partner device having an alternate authentication scheme for authenticating the third device type;

    receiving, by a server, a request to access the service, the request including a device type identifier of a device requesting the service;

    extracting the device type identifier from the request;

    determining whether the device type identifier corresponds to the first device type, the second device type, or third device type;

    selecting the first authentication module if the device type identifier corresponds to the first device type, selecting the second authentication module if the device type identifier corresponds to the second device type, and selecting the third authentication module if the device type identifier corresponds to the third device type;

    authenticating the request using the selected authentication module to determine whether the requesting device is permitted to access the service, thereby performing authentication of the requesting device using the authentication scheme specific to the requesting device; and

    providing access to the service when the selected authentication module determines that the requesting device is authorized to access the service, and preventing access to the service when the selected authentication module determines that the requesting device is not authorized to access the service.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×