×

Method for managing access to protected computer resources

  • US 9,413,768 B1
  • Filed: 04/28/2016
  • Issued: 08/09/2016
  • Est. Priority Date: 06/11/1997
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for controlling access to selected computer resources, the system comprising:

  • at least one authentication server having at least one associated database to register at least one digital identification of a hardware key associated with at least one client computer device;

    said at least one authentication server adapted to store in said at least one associated database (i) said at least one digital identification of said hardware key associated with said at least one client computer device, and (ii) authorization data associated with said selected computer resources;

    at least one access server adapted to receive from said at least one client computer device (i) said at least one digital identification of said hardware key associated with said at least one client computer device, and (ii) a request for said selected computer resources by said at least one client computer device;

    said at least one access server adapted to forward to said at least one authentication server said at least one digital identification of said hardware key associated with said at least one client computer device and said request for said selected computer resources by said at least one client computer device;

    said at least one authentication server adapted to authenticate said at least one digital identification of said hardware key associated with said at least one client computer device responsive to said request for said selected computer resources by said at least one client computer device;

    said at least one authentication server adapted to authorize said at least one client computer device to receive at least a portion of said selected computer resources based on said stored authorization data associated with said selected computer resources;

    said at least one authentication server adapted to permit access to said at least a portion of said selected computer resources (i) upon successfully authenticating said at least one digital identification of said hardware key associated with said at least one client computer device, and (ii) upon successfully authorizing said at least one client computer device; and

    said at least one authentication server adapted to acquire, for billing purposes, usage data associated with said at least a portion of said selected computer resources provided to said at least one client computer device.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×