×

Method for managing access to protected computer resources

  • US 9,369,469 B2
  • Filed: 11/21/2014
  • Issued: 06/14/2016
  • Est. Priority Date: 06/11/1997
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for controlling access, by at least one authentication server, to protected computer resources provided via an Internet Protocol network, the method comprising:

  • receiving, at the at least one authentication server from at least one access server, identity data associated with at least one client computer device;

    comparing, by the at least one authentication server, the identity data associated with the at least one client computer device to identity data stored in a database associated with the at least one authentication server;

    sending, by the at least one access server to the at least one client computer device, a challenge;

    receiving, at the at least one access server, a response from the at least one client computer device;

    comparing, at the at least one access server, the challenge and the response;

    receiving, by at least one server associated with the at least one authentication server, a request for the protected computer resources from the at least one client computer device;

    authorizing, by one of the at least one server associated with the at least one authentication server and another at least one server associated with the at least one authentication server, the at least one client computer device to receive at least a portion of the protected computer resources requested by the at least one client computer device based on data associated with the protected computer resources stored in at least one database associated with one of the at least one server associated with the at least one authentication server and the another at least one server associated with the at least one authentication server; and

    controlling access, by one of the at least one server associated with the at least one authentication server, the another at least one server associated with the at least one authentication server, and yet another at least one server associated with the at least one authentication server, to the at least a portion of the protected computer resources upon successfully comparing the identity data associated with the at least one client computer device and the identity data stored in the database associated with the at least one authentication server, and upon successful authorization of the at least one client computer device.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×