Authentication Using Device ID
First Claim
1. A method, comprising:
- receiving, at an authentication server, an authentication request, wherein the authentication request comprises device attributes;
generating, at the authentication server, a device ID using the device attributes;
creating, at the authentication server, an authentication token, wherein the authentication token is signed with the device ID;
transmitting, at the authentication server, the authentication token;
receiving, at the authentication server, a request to access protected resources, wherein the request comprises the authentication token and device attributes;
generating, at the authentication server, a comparison device ID based on the device attributes included in the request to access protected resources;
decrypting, at the authentication server, the authentication token;
retrieving, at the authentication server, the device ID generated from the decrypted authentication token;
validating, at the authentication server, the authentication token, wherein the validating comprises determining whether the device ID matches the comparison device ID; and
outputting, at the authentication server, a response.
1 Assignment
0 Petitions
Accused Products
Abstract
A system for authenticating a customer is disclosed. The customer may attempt to access protected resources located at an authentication server. The customer may log in to the authentication server'"'"'s website, thereby submitting an authentication request. The authentication request may comprise attributes of the device the customer uses to log in. The authentication server may generate a device ID using the received device attributes and generate an authentication token that is signed with the device ID. The authentication server may transmit the authentication token to the client device. Subsequent requests to access protected resources from the client device may include the authentication token that is signed with the device ID.
43 Citations
20 Claims
-
1. A method, comprising:
-
receiving, at an authentication server, an authentication request, wherein the authentication request comprises device attributes; generating, at the authentication server, a device ID using the device attributes; creating, at the authentication server, an authentication token, wherein the authentication token is signed with the device ID; transmitting, at the authentication server, the authentication token; receiving, at the authentication server, a request to access protected resources, wherein the request comprises the authentication token and device attributes; generating, at the authentication server, a comparison device ID based on the device attributes included in the request to access protected resources; decrypting, at the authentication server, the authentication token; retrieving, at the authentication server, the device ID generated from the decrypted authentication token; validating, at the authentication server, the authentication token, wherein the validating comprises determining whether the device ID matches the comparison device ID; and outputting, at the authentication server, a response. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable storage medium having computer-executable program instructions stored thereon that, when executed by a processor, cause the processor to:
-
receive an authentication request, wherein the authentication request comprises device attributes; generate a device ID using the device attributes; create an authentication token, wherein the authentication token is signed with the device ID; transmit the authentication token; receive a request to access protected resources, wherein the request comprises the authentication token and device attributes; generate a comparison device ID based on the device attributes included in the request to access protected resources; decrypt the authentication token; retrieve the device ID generated from the decrypted authentication token; validate the authentication token, wherein the validating comprises determining whether the device ID matches the comparison device ID; and output a response. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. An apparatus comprising:
-
a memory; a processor, wherein the processor executes computer-executable program instructions which cause the processor to; receive an authentication request, wherein the authentication request comprises device attributes; generate a device ID using the device attributes; create an authentication token, wherein the authentication token is signed with the device ID; transmit the authentication token; receive a request to access protected resources, wherein the request comprises the authentication token and device attributes; generate a comparison device ID based on the device attributes included in the request to access protected resources; decrypt the authentication token; retrieve the device ID generated from the decrypted authentication token; validate the authentication token, wherein the validating comprises determining whether the device ID matches the comparison device ID; and output a response. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification