Methods, devices, and mediums associated with security access requested on an as-needed basis
First Claim
1. An apparatus comprising memory having instructions stored thereon that, in response to execution by a processing device, cause the processing device to perform operations comprising,authenticating a user based on a first pre-shared secret associated with a first login request as a condition to granting the user limited access to a resource, wherein the first pre-shared secret is associated with the user;
- after granting the user the limited access to the resource, receiving a second request for the user, wherein the second request is received over a first communication path;
determining whether the second request corresponds to an additional level of access to the resource;
and in response to determining that the second request corresponds to the additional level of access to the resource, authenticating the user based on a second pre-shared secret as a condition to granting the user the additional level of access to the resource, wherein the additional level of access includes an access privilege that is not included in the grant of the limited access, wherein the second pre-shared secret is associated with the user, and wherein the second pre-shared secret is different than the first pre-shared secret;
wherein granting the additional level of access to the resource further comprises transmitting control access information over a second communication path that is different than the first communication path.
3 Assignments
0 Petitions
Accused Products
Abstract
In one example, a network device may be configured to authenticate a user based on a first pre-shared secret associated with a first login request as a condition to granting the user limited access. The network device may be configured to determine whether a received second request for the user is associated with an additional level of access. The network device may be configured to, in response to determining that the second request is associated with the additional level of access, authenticate the user based on a second pre-shared secret as a condition to granting the user the additional level of access.
14 Citations
38 Claims
-
1. An apparatus comprising memory having instructions stored thereon that, in response to execution by a processing device, cause the processing device to perform operations comprising,
authenticating a user based on a first pre-shared secret associated with a first login request as a condition to granting the user limited access to a resource, wherein the first pre-shared secret is associated with the user; -
after granting the user the limited access to the resource, receiving a second request for the user, wherein the second request is received over a first communication path; determining whether the second request corresponds to an additional level of access to the resource; and in response to determining that the second request corresponds to the additional level of access to the resource, authenticating the user based on a second pre-shared secret as a condition to granting the user the additional level of access to the resource, wherein the additional level of access includes an access privilege that is not included in the grant of the limited access, wherein the second pre-shared secret is associated with the user, and wherein the second pre-shared secret is different than the first pre-shared secret; wherein granting the additional level of access to the resource further comprises transmitting control access information over a second communication path that is different than the first communication path. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 33, 36)
-
-
12. A method comprising:
-
receiving a first login request for a user; in response to receiving the first login request, authenticating the user based on a first pre-shared secret as a condition to storing data in a memory device to grant the user limited access to a resource, wherein the first pre-shared secret is associated with the user; after granting the user the limited access to the resource, receiving a second request for the user, wherein the second request is received over a first communication path; determining whether the second request corresponds to an additional level of access to the resource; and in response to determining that the second request corresponds to the additional level of access to the resource, wherein the additional level of access includes an access privilege that is not included in the grant of the limited access, authenticating the user based on a second pre-shared secret as a condition to changing the data stored in the memory device to grant the user the additional level of access to the resource, wherein the second pre-shared secret is associated with the user, and wherein the second pre-shared secret is different than the first pre-shared secret; wherein granting the additional level of access to the resource further comprises transmitting control access information over a second communication path that is different than the first communication path. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 34, 37)
-
-
24. An apparatus, comprising:
-
means for authenticating the user based on a first pre-shared secret associated with a first login request as a condition to granting the user limited access to a resource, wherein the first pre-shared secret is associated with the user; means for determining whether a second request for the user corresponds to an additional level of access to the resource after granting the user the limited access to the resource and in response to receiving the second request; and means for authenticating the user based on a second pre-shared secret as a condition to granting the user the additional level of access to the resource in response to determining that the second request corresponds to the additional level of access to the resource, wherein the additional level of access includes an access privilege that is not included in the grant of the limited access, wherein the second pre-shared secret is associated with the user, and wherein the second pre-shared secret is different than the first pre-shared secret; and means for granting the additional level of access to the resource transmitting control access information over a second communication path that is different than a first communication path corresponding to the second request. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 35, 38)
-
Specification