Method for managing access to protected computer resources
First Claim
1. A system for controlling access to selected computer resources, the system comprising:
- at least one authentication server having at least one associated database to register at least one digital identification of a hardware key associated with at least one client computer device;
said at least one authentication server adapted to store in said at least one associated database (i) said at least one digital identification of said hardware key associated with said at least one client computer device, and (ii) authorization data associated with said selected computer resources;
at least one access server adapted to receive from said at least one client computer device (i) said at least one digital identification of said hardware key associated with said at least one client computer device, and (ii) a request for said selected computer resources by said at least one client computer device;
said at least one access server adapted to forward to said at least one authentication server said at least one digital identification of said hardware key associated with said at least one client computer device and said request for said selected computer resources by said at least one client computer device;
said at least one authentication server adapted to authenticate said at least one digital identification of said hardware key associated with said at least one client computer device responsive to said request for said selected computer resources by said at least one client computer device;
said at least one authentication server adapted to authorize said at least one client computer device to receive at least a portion of said selected computer resources based on said stored authorization data associated with said selected computer resources;
said at least one authentication server adapted to permit access to said at least a portion of said selected computer resources (i) upon successfully authenticating said at least one digital identification of said hardware key associated with said at least one client computer device, and (ii) upon successfully authorizing said at least one client computer device; and
said at least one authentication server adapted to acquire, for billing purposes, usage data associated with said at least a portion of said selected computer resources provided to said at least one client computer device.
3 Assignments
0 Petitions
Accused Products
Abstract
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes clearinghouse means for storing identity data of the first server computer and the client computer(s); server software means and client software means adapted to forward its identity data and identity data of the client computer(s) to the clearinghouse means at the beginning of an operating session; and a hardware key connected to the client computer, the key being adapted to generate a digital identification as part of the identity data; wherein the hardware key is implemented using a hardware token access system, a magnetic card access system, a smart card access system, a biometric identification access system or a central processing unit with a unique embedded digital identification.
455 Citations
45 Claims
-
1. A system for controlling access to selected computer resources, the system comprising:
-
at least one authentication server having at least one associated database to register at least one digital identification of a hardware key associated with at least one client computer device; said at least one authentication server adapted to store in said at least one associated database (i) said at least one digital identification of said hardware key associated with said at least one client computer device, and (ii) authorization data associated with said selected computer resources; at least one access server adapted to receive from said at least one client computer device (i) said at least one digital identification of said hardware key associated with said at least one client computer device, and (ii) a request for said selected computer resources by said at least one client computer device; said at least one access server adapted to forward to said at least one authentication server said at least one digital identification of said hardware key associated with said at least one client computer device and said request for said selected computer resources by said at least one client computer device; said at least one authentication server adapted to authenticate said at least one digital identification of said hardware key associated with said at least one client computer device responsive to said request for said selected computer resources by said at least one client computer device; said at least one authentication server adapted to authorize said at least one client computer device to receive at least a portion of said selected computer resources based on said stored authorization data associated with said selected computer resources; said at least one authentication server adapted to permit access to said at least a portion of said selected computer resources (i) upon successfully authenticating said at least one digital identification of said hardware key associated with said at least one client computer device, and (ii) upon successfully authorizing said at least one client computer device; and said at least one authentication server adapted to acquire, for billing purposes, usage data associated with said at least a portion of said selected computer resources provided to said at least one client computer device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system for controlling access to selected computer resources, the system comprising:
-
at least one authentication server having at least one associated database to register at least one digital identification of a hardware key associated with at least one client computer device; said at least one authentication server adapted to store in said at least one associated database (i) said at least one digital identification of said hardware key associated with said at least one client computer device, (ii) identity data of at least one access server, and (iii) authorization data associated with said selected computer resources; at least one access server adapted to receive from said at least one client computer device (i) said at least one digital identification of said hardware key associated with said at least one client computer device, and (ii) a request for said selected computer resources by said at least one client computer device; said at least one access server adapted to forward to said at least one authentication server said at least one digital identification of said hardware key associated with said at least one client computer device, said request for said selected computer resources by said at least one client computer device, and said identity data of said at least one access server; said at least one authentication server adapted to authenticate said identity data of at least one access server and said at least one digital identification of said hardware key associated with said at least one client computer device responsive to said request for said selected computer resources by said at least one client computer device; said at least one authentication server adapted to authorize said at least one client computer device to receive at least a portion of said selected computer resources based on said stored authorization data associated with said selected computer resources; said at least one authentication server adapted to permit access to said at least a portion of said selected computer resources (i) upon successfully authenticating said at least one digital identification of said hardware key associated with said at least one client computer device and said identity data of at least one access server, and (ii) upon successfully authorizing said at least one client computer device; and said at least one authentication server adapted to acquire, for billing purposes, usage data associated with said at least a portion of said selected computer resources provided to said at least one client computer device. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45)
-
Specification