Method for managing access to protected computer resources
First Claim
1. A method for controlling access to selected computer resources using at least one of a transmission control protocol and a user datagram protocol, the method comprising:
- provisioning, with at least one associated database of at least one authentication server, identity data associated with at least one client computer device;
storing, by the at least one authentication server in the at least one associated database, the identity data associated with the at least one client computer device;
receiving, by at least one access server from the at least one client computer device, (i) the identity data associated with the at least one client computer device, and (ii) a request for the selected computer resources by the at least one client computer device;
forwarding, by the at least one access server to the at least one authentication server, the identity data associated with the at least one client computer device and the request for the selected computer resources by the at least one client computer device;
authenticating, by the at least one authentication server, the identity data associated with the at least one client computer device in response to the request for the selected computer resources by the at least one client computer device;
authorizing, by at least one server associated with the at least one authentication server, the at least one client computer device to receive at least a portion of the selected computer resources; and
permitting access, by the at least one authentication server, to the at least a portion of the selected computer resources (i) upon successfully authenticating the identity data associated with the at least one client computer device, and (ii) upon successfully authorizing the at least one client computer device.
3 Assignments
0 Petitions
Accused Products
Abstract
A system for securing and tracking usage of transaction services or computer resources by a client computer from a first server computer, which includes clearinghouse means for storing identity data of the first server computer and the client computer(s); server software means and client software means adapted to forward its identity data and identity data of the client computer(s) to the clearinghouse means at the beginning of an operating session; and a hardware key connected to the client computer, the key being adapted to generate a digital identification as part of the identity data; wherein the hardware key is implemented using a hardware token access system, a magnetic card access system, a smart card access system, a biometric identification access system or a central processing unit with a unique embedded digital identification.
-
Citations
57 Claims
-
1. A method for controlling access to selected computer resources using at least one of a transmission control protocol and a user datagram protocol, the method comprising:
-
provisioning, with at least one associated database of at least one authentication server, identity data associated with at least one client computer device; storing, by the at least one authentication server in the at least one associated database, the identity data associated with the at least one client computer device; receiving, by at least one access server from the at least one client computer device, (i) the identity data associated with the at least one client computer device, and (ii) a request for the selected computer resources by the at least one client computer device; forwarding, by the at least one access server to the at least one authentication server, the identity data associated with the at least one client computer device and the request for the selected computer resources by the at least one client computer device; authenticating, by the at least one authentication server, the identity data associated with the at least one client computer device in response to the request for the selected computer resources by the at least one client computer device; authorizing, by at least one server associated with the at least one authentication server, the at least one client computer device to receive at least a portion of the selected computer resources; and permitting access, by the at least one authentication server, to the at least a portion of the selected computer resources (i) upon successfully authenticating the identity data associated with the at least one client computer device, and (ii) upon successfully authorizing the at least one client computer device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for controlling access to selected computer resources using at least one of a transmission control protocol and a user datagram protocol, the method comprising:
-
receiving, by at least one access server from at least one client computer device, (i) identity data associated with the at least one client computer device, and (ii) a request for the selected computer resources by the at least one client computer device; forwarding, by the at least one access server to at least one authentication server, the identity data associated with the at least one client computer device and the request for the selected computer resources; authenticating, by the at least one authentication server, the identity data associated with the at least one client computer device in response to the request for the selected computer resources; authorizing, by at least one server associated with the at least one authentication server, the at least one client computer device to receive at least a portion of the selected computer resources; controlling access, by the at least one authentication server, to the at least a portion of the selected computer resources (i) upon successfully authenticating the identity data associated with the at least one client computer device, and (ii) upon successfully authorizing the at least one client computer device. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A method for controlling access to selected computer resources using at least one of a transmission control protocol and a user datagram protocol, the method comprising:
-
receiving, by at least one access server from at least one client computer device, identity data associated with the at least one client computer device; receiving, by the at least one access server from the at least one client computer device, a request for the selected computer resources by the at least one client computer device; forwarding, by the at least one access server to at least one authentication server, the identity data associated with the at least one client computer device and the request for the selected computer resources; authenticating, by the at least one authentication server, the identity data associated with the at least one client computer device in response to the request for the selected computer resources; authorizing, by at least one server associated with the at least one authentication server, the at least one client computer device to receive at least a portion of the selected computer resources; permitting access, by the at least one authentication server, to the at least a portion of the selected computer resources (i) upon successfully authenticating the identity data associated with the at least one client computer device, and (ii) upon successfully authorizing the at least one client computer device. - View Dependent Claims (56)
-
-
57. A method for controlling access to selected computer resources using at least one of a transmission control protocol and a user datagram protocol, the method comprising:
-
encapsulating the at least one of a transmission control protocol and a user datagram protocol in at least another protocol; receiving, by at least one access server from at least one client computer device, (i) identity data associated with the at least one client computer device, and (ii) a request for the selected computer resources by the at least one client computer device; forwarding, by the at least one access server to at least one authentication server, the identity data associated with the at least one client computer device and the request for the selected computer resources; authenticating, by the at least one authentication server, the identity data associated with the at least one client computer device in response to the request for the selected computer resources; receiving, by at least one server associated with the at least one authentication server, a request for authorization data from the at least one client computer device; authorizing, by the at least one server associated with the at least one authentication server, the at least one client computer device to receive at least a portion of the selected computer resources; permitting access, by the at least one authentication server, to the at least a portion of the selected computer resources upon (i) successfully authenticating the identity data associated with the at least one client computer device, and (ii) successfully authorizing the at least one client computer device; re-authorizing by the at least one server associated with the at least one authentication server, the at least one client computer device to receive a portion of the selected computer resources; and acquiring, by another at least one server associated with the at least one authentication server, usage data associated with the at least a portion of the selected computer resources provided to the at least one client computer device.
-
Specification