Authentication for network access related applications
First Claim
Patent Images
1. A controller comprising:
- logic to;
receive an authentication request from a user for an authentication for access via user initiation of a login procedure;
receive, during the authentication, via a near field communication link with a data card, an identification packet generated by a remote authentication provider;
sign the identification packet to attest that the identification packet was securely received via the near field communication link and that the user authorized the authentication request;
transmit the identification packet to the remote authentication provider;
receive an authorization from the remote authentication provider, responsive to information in the identification packet;
after receipt of the authorization, retrieve from a local storage login information associated with the identification packet; and
implement the login procedure using the login information, to enable the user to access a network resource remotely coupled to the controller.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment a controller comprises logic to receive, via a near field communication link, an identification packet generated by a remote authentication provider, associate an electronic signature with the identification packet, transmit the identification packet to a remote authentication provider, receive an authorization from the remote authentication provider, receive login information associated with the identification packet, and initiate a login procedure using the login information. Other embodiments may be described.
-
Citations
24 Claims
-
1. A controller comprising:
logic to; receive an authentication request from a user for an authentication for access via user initiation of a login procedure; receive, during the authentication, via a near field communication link with a data card, an identification packet generated by a remote authentication provider; sign the identification packet to attest that the identification packet was securely received via the near field communication link and that the user authorized the authentication request; transmit the identification packet to the remote authentication provider; receive an authorization from the remote authentication provider, responsive to information in the identification packet; after receipt of the authorization, retrieve from a local storage login information associated with the identification packet; and implement the login procedure using the login information, to enable the user to access a network resource remotely coupled to the controller. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. An electronic device, comprising:
-
a processor to execute an operating system which is to implement an untrusted computing environment; and a controller, comprising; a memory; and logic to; receive an authentication request from a user for an authentication for access via user initiation of a login procedure; receive, during the authentication, via a near field communication link with a data card, an identification packet generated by a remote authentication provider; sign the identification packet to attest that the identification packet was securely received via the near field communication link and that the user authorized the authentication request; transmit the identification packet to the remote authentication provider; receive an authorization from the remote authentication provider, responsive to information in the identification packet; after receipt of the authorization, retrieve from a local storage login information associated with the identification packet; and implement the login procedure using the login information, to enable the user to access a network resource remotely coupled to the controller. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
receiving, during an authentication for access, via a near field communication link with a data card, an identification packet generated by a remote authentication provider; associating an electronic signature with the identification packet; transmitting the identification packet to the remote authentication provider; receiving an authorization from the remote authentication provider, responsive to information in the identification packet; responsive to the authorization, retrieving login information associated with the identification packet in a host proxy of an electronic device from a local database; and initiating a login procedure using the login information, to enable the user to access a network resource remotely coupled to the electronic device. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computer program product comprising logic instructions stored on non-transitory computer readable medium which, when executed by a processor, configure the processor to:
-
receive, during an authentication for access, via a near field communication link with a data card, an identification packet generated by a remote authentication provider; associate an electronic signature with the identification packet; transmit the identification packet to the remote authentication provider; receive an authorization from the remote authentication provider, responsive to information in the identification packet; responsive to the authorization, retrieve from a local storage login information associated with the identification packet in a host proxy of an electronic device from a local database; and initiate a login procedure using the login information, to enable the user to access a network resource remotely coupled to the electronic device. - View Dependent Claims (21, 22, 23, 24)
-
Specification