Systems and methods for providing secure services
First Claim
Patent Images
1. A method comprising;
- authenticating a first device;
providing an authorization element based upon the authentication of the first device;
authorizing the first device using the authorization element;
providing a security token to the first device based upon the authorization of the first device, wherein the first device is within a first network and the security token is received by the first device from a second network external to the first network; and
providing the security token to a second device, wherein the second device is within the first network, and wherein the second device receives a request for information from the first device via the first network, the request for information comprising an unencrypted data field and an encrypted data field, and wherein the encrypted data field is encrypted using the security token such that the second device will authenticate the request for information using the security token.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for providing one or more secure services are disclosed. One method can comprise authenticating and/or authorizing a user device to receive a security token. A request for information can be processed using the security token to facilitate the secure provision of services to the user device.
22 Citations
20 Claims
-
1. A method comprising;
-
authenticating a first device; providing an authorization element based upon the authentication of the first device; authorizing the first device using the authorization element; providing a security token to the first device based upon the authorization of the first device, wherein the first device is within a first network and the security token is received by the first device from a second network external to the first network; and providing the security token to a second device, wherein the second device is within the first network, and wherein the second device receives a request for information from the first device via the first network, the request for information comprising an unencrypted data field and an encrypted data field, and wherein the encrypted data field is encrypted using the security token such that the second device will authenticate the request for information using the security token. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising;
-
receiving, at a first device in a first network, a request for information comprising an encrypted data field and an unencrypted data field, wherein the request for information is from a second device in the first network; receiving, at the first device, a security token from a second network external to the first network; decrypting the encrypted data field using the security token, wherein the encrypted data field relates to one or more available services; comparing the decrypted data field and the unencrypted data field; and if the decrypted data field matches the unencrypted data field, providing access to the one or more available services to the second device. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving, at a first device in a first network, a security token from a second device in a second network external to the first network based on authentication of user credentials received at the first device; generating, at the first device, a request for a service comprising a first unencrypted portion and a second portion encrypted based on the security token; providing, via the first network, the request for the service to a third device in the first network, wherein the third device is configured to authenticate the request by comparing a result of decrypting the second portion to the first unencrypted portion; receiving, at the first device, access to the service in response to the third device authenticating the request; and providing the service to a user device in response to receiving access to the service. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification