Network mediated multi-device shared authentication
First Claim
1. An apparatus, comprising:
- a communication interface; and
authentication logic coupled with the communication interface;
wherein the authentication logic authenticates with a first neighboring device belonging to a set of neighboring devices thereby establishing a trust relationship between the apparatus and the set of neighboring devices;
wherein the authentication logic obtains via the communication interface data representative of a user associated with a user device;
wherein the authentication logic sends a challenge to the user device, via the communication interface, the challenge requesting data associated with the user associated with the user device;
wherein the authentication logic receives a response to the challenge via the communication interface;
wherein the response is selectively validated by an associated authentication server associated with the set of neighboring devices;
wherein the authentication logic selectively enables access by the user device to the apparatus in accordance with the authentication server selectively validating the response to the challenge; and
wherein the authentication logic selectively provides data to the first neighboring device in accordance with the authentication server selectively validating the response to the challenge, the data indicating that the user associated with the user device has been authenticated to enable access by the user associated with the user device to the set of neighboring devices.
1 Assignment
0 Petitions
Accused Products
Abstract
Described in an example embodiment herein is an apparatus, comprising a communication interface and authentication logic coupled with the wireless interface. The authentication logic authenticates with at least one neighboring device forming a trust relationship with the at least one neighboring device. The authentication logic obtains via the communication interface data representative of a user associated with a user device. The authentication logic sends a challenge to the user device, via the communication interface, the challenge requesting data associated with the user associated with the user device. The authentication logic receives a response to the challenge via the user interface and validates the response to the challenge. The authentication logic provides data to the at least one neighboring device indicating that the user associated with the user device has been authenticated, to enable access to the functionality and/or resources of the at least one neighboring device.
28 Citations
16 Claims
-
1. An apparatus, comprising:
-
a communication interface; and authentication logic coupled with the communication interface; wherein the authentication logic authenticates with a first neighboring device belonging to a set of neighboring devices thereby establishing a trust relationship between the apparatus and the set of neighboring devices; wherein the authentication logic obtains via the communication interface data representative of a user associated with a user device; wherein the authentication logic sends a challenge to the user device, via the communication interface, the challenge requesting data associated with the user associated with the user device; wherein the authentication logic receives a response to the challenge via the communication interface; wherein the response is selectively validated by an associated authentication server associated with the set of neighboring devices; wherein the authentication logic selectively enables access by the user device to the apparatus in accordance with the authentication server selectively validating the response to the challenge; and wherein the authentication logic selectively provides data to the first neighboring device in accordance with the authentication server selectively validating the response to the challenge, the data indicating that the user associated with the user device has been authenticated to enable access by the user associated with the user device to the set of neighboring devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus, comprising:
-
a communication interface; authentication logic coupled with the communication interface; and a user interface; wherein the authentication logic provides a username of an associated user of the apparatus to a first neighboring networked device belonging to a set of at least two mutually authenticated neighboring devices; wherein the authentication logic receives a challenge associated with the username; wherein the authentication logic provides a response to the challenge; wherein the challenge is provided to the user interface and the response to the challenge is received via the user interface; wherein the response to the challenge is selectively validated by an authentication server associated with the set of at least two mutually authenticated neighboring devices; wherein the authentication logic determines the user has been authenticated with the first neighboring networked device and at least one other networked device of the set of at least two mutually authenticated neighboring devices associated with the first neighboring networked device; wherein the authentication logic determines other networked devices associated with the networked device requesting authentication; wherein data representative of the other networked devices associated with the networked device requesting authentication is provided to the user interface; wherein data representative of a user selection is received via the user interface indicating which of the other networked devices associated with the networked device are allowed to be authenticated; and wherein the authentication logic limits authentication to devices that the data representative of a user selection indicates are allowed to be authenticated. - View Dependent Claims (10, 11)
-
-
12. A non-transitory computer-readable storage medium storing authentication logic, which, when executed by a processor on a networked computing device, performs operations to:
-
authenticate with a first neighboring device belonging to a set of neighboring devices thereby establishing a trust relationship between the networked computing device and the set of neighboring devices; obtain via the communication interface data representative of a user associated with a user device; send a challenge to the user device, via the communication interface, the challenge requesting data associated with the user associated with the user device; receive a response to the challenge via the communication interface, wherein the response is selectively validated by an associated authentication server associated with the set of neighboring devices; enable access by the user device to the networked computing device in accordance with the authentication server selectively validating the response to the challenge; and selectively provide data to the first neighboring device in accordance with the authentication server selectively validating the response to the challenge, the data indicating that the user associated with the user device has been authenticated to enable access by the user associated with the user device to the set of neighboring devices. - View Dependent Claims (13, 14)
-
-
15. A method, comprising:
-
authenticating, by a processor executing authentication logic on a networked computing device, with a first neighboring device belonging to a set of neighboring devices thereby establishing a trust relationship between the networked computing device and the set of neighboring devices; obtaining via a communication interface data representative of a user associated with a user device; sending a challenge to the user device, via the communication interface, the challenge requesting data associated with the user associated with the user device; receiving a response to the challenge via the communication interface, wherein the response is selectively validated by an associated authentication server associated with the set of neighboring devices; enabling access by the user device to the networked computing device in accordance with the authentication server selectively validating the response to the challenge; and selectively providing data to the first neighboring device in accordance with the authentication server selectively validating the response to the challenge, the data indicating that the user associated with the user device has been authenticated to enable access by the user associated with the user device to the set of neighboring devices. - View Dependent Claims (16)
-
Specification