×

Electronic rendezvous-based two stage access control for private networks

  • US 8,925,045 B2
  • Filed: 12/28/2012
  • Issued: 12/30/2014
  • Est. Priority Date: 12/28/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for providing access to a private network resource comprising:

  • receiving an indication from an electronic rendezvous service that a client application has passed a first set of authentication and authorization processes before the private network resource has been contacted, wherein the indication comprises a time that indicates when the client application passed the first set of authentication and authorization processes;

    receiving a request from the client application to access the private network resource;

    allowing the client application to attempt to perform a second set of authentication and authorization processes based at least in part on both receiving the indication from the electronic rendezvous service that the client application has passed the first set of authentication and authorization processes and receiving the request from the client application to access the private network resource within a set limited amount of time after the client application passed the first set of authentication and authorization processes;

    performing the second set of authentication and authorization processes; and

    enabling the client application to access the private network resource based at least in part on a determination that the client application has passed the first set of authentication and authorization processes and the second set of authentication and authorization processes,wherein enabling the client application to access the private network resource comprises enabling the client application to access the private network resource based at least in part on the determination that the client application has passed the first set of authentication and authorization processes and the second set of authentication and authorization processes within a predetermined time frame, andwherein at least one of the receiving allowing, performing, and enabling steps is implemented in hardware.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×