System and method for enforcing a policy for an authenticator device
First Claim
Patent Images
1. A method for authentication on an electronic authenticator device comprising:
- defining at least one authenticator device authentication policy;
collecting an authenticator device status assessment;
evaluating policy compliance of the authenticator device status assessment to an associated defined authenticator device authentication policy; and
enforcing use of the authenticator device according to the policy compliance comprising;
if the policy compliance indicates the authenticator device status assessment is in compliance with the authenticator device authentication policy, allowing the authenticator device to be used as an authentication factor; and
if the policy compliance indicates the authenticator device status assessment is not in compliance with the authenticator device authentication policy, preventing the authenticator device from being used as an authentication factor.
5 Assignments
0 Petitions
Accused Products
Abstract
A system and method including defining at least one device authentication policy; at a policy engine, initializing authentication policy processing for an authenticator device; collecting device status assessment; evaluating policy compliance of the device status assessment to an associated defined device authentication policy; and enforcing use of the authenticator device according to the policy compliance.
-
Citations
20 Claims
-
1. A method for authentication on an electronic authenticator device comprising:
-
defining at least one authenticator device authentication policy; collecting an authenticator device status assessment; evaluating policy compliance of the authenticator device status assessment to an associated defined authenticator device authentication policy; and enforcing use of the authenticator device according to the policy compliance comprising; if the policy compliance indicates the authenticator device status assessment is in compliance with the authenticator device authentication policy, allowing the authenticator device to be used as an authentication factor; and if the policy compliance indicates the authenticator device status assessment is not in compliance with the authenticator device authentication policy, preventing the authenticator device from being used as an authentication factor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification