Service channel authentication token
First Claim
1. An apparatus comprising:
- at least one memory device;
at least one processor coupled to the at least one memory device and configured to perform, based on instructions stored in the at least one memory device;
receiving a service request for a protected resource from a first user device, wherein the service request includes a plurality of device attributes and an authentication token;
selecting, based on a first attribute selection, a first attribute set from the plurality of device attributes contained in the service request, wherein at least one attribute in the plurality of device attributes is not included in the first attribute set and wherein the first attribute selection of the first user device is different from a second attribute selection for a second user device;
determining a derived device identification from the first attribute set;
when a signed device identification of the authentication token contained in the service request and the derived device identification are equal, continue processing the service request;
when the signed device identification is not equal to the derived device identification, rejecting the service request; and
replacing one attribute of the first attribute set with at least one other attribute from the plurality of device attributes to obtain a greater degree of security and preserving uniqueness of the derived device identification.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer system receives an authentication request from a user device and determines a determined device identification from a set of received device attributes. When the device is properly authenticated, the computer system generates an authentication token that is signed by the determined device identification and returns the authentication token to the user device. When the computer system subsequently receives a service request with an authentication token and a plurality of device attributes for a protected resource from a user device, the computer system determines a derived device identification from some or all of the received device attributes. When a signed device identification of the authentication token and the derived device identification are equal, the apparatus continues processing the service request. Otherwise, the service request is rejected.
-
Citations
12 Claims
-
1. An apparatus comprising:
-
at least one memory device; at least one processor coupled to the at least one memory device and configured to perform, based on instructions stored in the at least one memory device; receiving a service request for a protected resource from a first user device, wherein the service request includes a plurality of device attributes and an authentication token; selecting, based on a first attribute selection, a first attribute set from the plurality of device attributes contained in the service request, wherein at least one attribute in the plurality of device attributes is not included in the first attribute set and wherein the first attribute selection of the first user device is different from a second attribute selection for a second user device; determining a derived device identification from the first attribute set; when a signed device identification of the authentication token contained in the service request and the derived device identification are equal, continue processing the service request; when the signed device identification is not equal to the derived device identification, rejecting the service request; and replacing one attribute of the first attribute set with at least one other attribute from the plurality of device attributes to obtain a greater degree of security and preserving uniqueness of the derived device identification. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-assisted method for authenticating a user device, the method comprising:
-
receiving a service request for a protected resource from a user device, wherein the service request includes a plurality of device attributes and a received authentication token; selecting, based on a first attribute selection, an attribute set from the plurality of device attributes contained in the service request, wherein at least one attribute in the plurality of device attributes is not included in the attribute set and wherein the first attribute selection of the first user device is different from a second attribute selection for a second user device; determining a derived device identification from the attribute set contained in the plurality of device attributes; when a signed device identification of the received authentication token contained in the service request and the derived device identification are equal, continue processing the service request; and when the signed device identification is not equal to the derived device identification, rejecting the service request; and replacing one attribute of the first attribute set with at least one other attribute from the plurality of device attributes to obtain at least a same degree of security and preserving uniqueness of the derived device identification. - View Dependent Claims (9, 10, 11)
-
-
12. A non-transitory computer-readable storage medium storing computer-executable instructions that, when executed, cause a processor at least to perform operations comprising:
-
receiving a service request for a protected resource from a user device, wherein the service request includes a plurality of device attributes and an authentication token; selecting, based on a first attribute selection, a first attribute set from the plurality of device attributes contained in the service request, wherein at least one attribute in the plurality of device attributes is not included in the attribute set and wherein the first attribute selection of the first user device is different from a second attribute selection for a second user device; determining a derived device identification from the first attribute set contained in the plurality of device attributes; when a signed device identification of the authentication token contained in the service request and the derived device identification are equal, continue processing the service request; when the signed device identification is not equal to the derived device identification, rejecting the service request; and replacing one attribute of the first attribute set with at least one other attribute from the plurality of device attributes to obtain at least a same degree of security and preserving uniqueness of the derived device identification.
-
Specification