Method of authorizing an operation to be performed on a targeted computing device
First Claim
Patent Images
1. A method of requesting an operation be performed on a targeted computing device, said method comprising:
- generating a request to perform the operation on the targeted computing device, the request including a geographic location of the targeted computing device, the operation to be performed on the targeted computing device, and a time period in which the operation will be performed;
signing the request with a private key of a first private, public key pair;
transmitting the request to an authentication server;
receiving, in response to the request, an authorization response from the authentication server that includes the request and an authorization token, wherein the authorization token includes at least one of a predetermined authorization period, an authorization to perform the operation on a predetermined targeted computing device, and an authorization to perform predetermined operations on the targeted computing device; and
transmitting the authorization response to the targeted computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of authorizing an operation to be performed on a targeted computing device is provided. The method includes generating a request to perform an operation on the targeted computing device, signing the request with a private key of a first private, public key pair, transmitting the request to an authentication server, receiving an authorization response from the authentication server that includes the request and an authorization token, and transmitting the authorization response to the targeted computing device.
86 Citations
17 Claims
-
1. A method of requesting an operation be performed on a targeted computing device, said method comprising:
-
generating a request to perform the operation on the targeted computing device, the request including a geographic location of the targeted computing device, the operation to be performed on the targeted computing device, and a time period in which the operation will be performed; signing the request with a private key of a first private, public key pair; transmitting the request to an authentication server; receiving, in response to the request, an authorization response from the authentication server that includes the request and an authorization token, wherein the authorization token includes at least one of a predetermined authorization period, an authorization to perform the operation on a predetermined targeted computing device, and an authorization to perform predetermined operations on the targeted computing device; and transmitting the authorization response to the targeted computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of authorizing an operation to be performed on a targeted computing device, said method comprising:
-
receiving, at an authentication server, a request from a requesting device to perform the operation on the targeted computing device, the request including parameters that include a geographic location of the targeted computing device, the operation to be performed on the targeted computing device, and a time period in which the operation will be performed; verifying, at the authentication server, the request with a public key of a first private, public key pair, wherein the request is signed by a private key of the first private, public key pair; forming, at the authentication server in response to the request, an authorization response that includes the request and an authorization token, wherein the authorization token includes at least one of a predetermined authorization period, an authorization to perform the operation on a predetermined targeted computing device, and an authorization to perform predetermined operations on the targeted computing device; and transmitting, at the authentication server, the authorization response to the requesting device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method of carrying out an operation on a targeted computing device, said method comprising:
-
receiving, at a requesting device, an authorization response from an authorization server, the authorization response including a request to perform the operation on the targeted computing device, including parameters that include a geographic location of the targeted computing device, the operation to be performed on the targeted computing device, a time period in which the operation will be performed, and an authorization token, the authorization response generated by the authorization server in response to the request, wherein the authorization token includes at least one of a predetermined authorization period, an authorization to perform the operation on a predetermined targeted computing device, and an authorization to perform predetermined operations on the targeted computing device; verifying, at the requesting device, the authorization response with a public key of a private, public key pair, wherein the authorization response is signed by a private key of the private, public key pair; and granting, at the requesting device, authorization to perform the operation upon verification of the authorization response. - View Dependent Claims (16, 17)
-
Specification