Hardware-based credential distribution
First Claim
Patent Images
1. A system comprising:
- a network interface configured to communicate data over a network;
one or more processors; and
a memory coupled to the one or more processors and including processor-executable instructions that, responsive to execution by the one or more processors, implement a resource access manager to;
receive, via the network interface, a resource access request from a remote entity, the resource access request received prior to the remote entity accessing a resource and including a unique identifier of the remote entity and a hardware profile of the remote entity, the unique identifier of the remote entity being generated in association with a secure registration process prior to receiving the resource access request;
determine that the hardware profile of the resource access request matches at least a portion of a stored hardware profile associated with the unique identifier;
determine that a frequency of credential distribution associated with the unique identifier of the remote entity does not exceed a credential distribution frequency limit associated with the unique identifier of the remote entity, the credential distribution frequency limit being effective to limit credentials distributed in association with the unique identifier to one credential per one interval of time; and
transmit, via the network interface and responsive to determining that the credential distribution frequency limit has not been exceeded, a credential to the remote entity useful to access the resource.
2 Assignments
0 Petitions
Accused Products
Abstract
This document describes various techniques for distributing credentials based on hardware profiles. A resource access request including a hardware profile is transmitted to a remote entity having access to a previous hardware profile and a credential useful to access a resource is received if at least a portion of the hardware profile matches the previous hardware profile.
52 Citations
20 Claims
-
1. A system comprising:
-
a network interface configured to communicate data over a network; one or more processors; and a memory coupled to the one or more processors and including processor-executable instructions that, responsive to execution by the one or more processors, implement a resource access manager to; receive, via the network interface, a resource access request from a remote entity, the resource access request received prior to the remote entity accessing a resource and including a unique identifier of the remote entity and a hardware profile of the remote entity, the unique identifier of the remote entity being generated in association with a secure registration process prior to receiving the resource access request; determine that the hardware profile of the resource access request matches at least a portion of a stored hardware profile associated with the unique identifier; determine that a frequency of credential distribution associated with the unique identifier of the remote entity does not exceed a credential distribution frequency limit associated with the unique identifier of the remote entity, the credential distribution frequency limit being effective to limit credentials distributed in association with the unique identifier to one credential per one interval of time; and transmit, via the network interface and responsive to determining that the credential distribution frequency limit has not been exceeded, a credential to the remote entity useful to access the resource. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving, via a network interface, a resource access request from a remote entity, the resource access request received prior to the remote entity accessing a resource and including a unique identifier of the remote entity and a hardware profile of the remote entity, the unique identifier of the remote entity being generated in association with a secure registration process prior to receiving the resource access request; determining that the hardware profile of the resource access request matches at least a portion of a stored hardware profile associated with the unique identifier; determining that a frequency of credential distribution associated with the unique identifier of the remote entity does not exceed a credential distribution frequency limit associated with the unique identifier of the remote entity, the credential distribution frequency limit being effective to limit credentials distributed in association with the unique identifier to one credential per one interval of time; and transmitting, via the network interface and responsive to determining that the credential distribution frequency limit has not been exceeded, a credential to the remote entity useful to access the resource. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
-
15. One or more computer-readable storage devices comprising processor-executable instructions that, responsive to execution by one or more processors, implement a resource access manager to:
-
receive, via a network interface, a resource access request from a remote entity, the resource access request received prior to the remote entity accessing a resource for which the resource access request requests access and including a unique identifier of the remote entity and a hardware profile of the remote entity, the unique identifier of the remote entity being generated in association with a secure registration process prior to receiving the resource access request; determine that the hardware profile of the resource access request matches at least a portion of a stored hardware profile associated with the unique identifier; determine that a frequency of credential distribution associated with the unique identifier of the remote entity does not exceed a credential distribution frequency limit associated with the unique identifier, the credential distribution frequency limit being effective to limit credentials distributed in association with the unique identifier to one credential per one interval of time; and transmit, via the network interface and responsive to determining that the credential distribution frequency limit associated with the unique identifier of the remote entity has not been exceeded, a credential to the remote entity effective to grant the remote entity access to the resource for which the resource access request requests access. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification