×

Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network

DC CAFC
  • US 7,290,288 B2
  • Filed: 08/29/2002
  • Issued: 10/30/2007
  • Est. Priority Date: 06/11/1997
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for protecting resources of at least one server computer, said at least one server computer providing said protected resources to at least one client computer device via an untrusted network, without necessarily protecting other computer resources provided by said at least one server computer and by other server computers to other client computer devices, comprising:

  • at least one clearinghouse for storing (i) identity data of said at least one server computer and (ii) identity data of each of said at least one client computer device and (iii) authorization data associated with said protected resources;

    server software installed on said at least one server computer that forwards the identity data of said at least one server computer and the identity data of each of said at least one client computer device to said at least one clearinghouse;

    client software installed on each of said at least one client computer device that forwards its identity data to said at least one server computer;

    at least one hardware key associated with said at least one client computer device, said at least one hardware key generating a digital identification, the identity data of said at least one client computer device comprising said digital identification;

    said server software installed on said at least one server computer selectively requiring said at least one client computer device to forward said digital identification to said at least one server computer;

    said at least one clearinghouse authenticating the identity of said at least one client computer device responsive to a request for said protected resources of said at least one server computer by said at least one client computer device;

    said at least one clearinghouse authenticating the identity of said at least one server computer responsive to said at least one client computer device making the request for said protected resources of said at least one server computer;

    said at least one clearinghouse authorizing said at least one client computer device to receive said requested protected resources, based on said stored authorization data; and

    ,said at least one clearinghouse controlling access to said requested protected resources of said at least one server computer responsive to successful authentication of said at least one server computer and of said at least one client computer device making the request and responsive to successful authorization of said at least one client computer device.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×