×

Access point—authentication server combination

  • US 9,306,943 B1
  • Filed: 03/29/2013
  • Issued: 04/05/2016
  • Est. Priority Date: 03/29/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method of controlling access to a protected resource, the method comprising:

  • providing, by a SOHO (small office/home office) device connected to a private network and to a public network, a tokencode prompt to a user device roaming on the public network, the tokencode prompt requesting a tokencode from an electronic token possessed by a user of the user device, the SOHO device including a database containing a set of token seeds from which expected one-time use passcodes (OTPs) are derived;

    receiving, by the SOHO device from the user device, a current tokencode from the electronic token possessed by the user; and

    performing, by the SOHO device, an authentication operation based on the current tokencode, a result of the authentication operation (i) permitting the user to access the protected resource when the authentication operation determines that the user is legitimate and (ii) denying the user access to the protected resource when the authentication operation determines that the user is not legitimate;

    wherein the SOHO device is a network firewall unit having (i) network ports and (ii) a controller which performs network firewall operations to control network traffic between the network ports; and

    wherein performing the authentication operation includes;

    running, by the controller of the network firewall unit, a tokencode authentication server; and

    locally comparing, by the tokencode authentication server run by the controller of the network firewall unit, the current tokencode to an expected tokencode to determine whether the user is legitimate,and wherein the method further comprises;

    providing, by the SOHO device, a token seed from the database to the electronic token possessed by the user to configure the electronic token to provide, as tokencodes, current OTPs for comparison with the expected OTPs during authentication; and

    providing the user device roaming on the public network with control of a home appliance on the private network when the user is legitimate.

View all claims
  • 18 Assignments
Timeline View
Assignment View
    ×
    ×