System for managing access to protected computer resources
DC CAFCFirst Claim
1. A system for controlling access to protected computer resources provided via a network utilizing at least one Internet Protocol, the system comprising:
- at least one authentication server having an associated database to store (i) identity data associated with at least one client computer device, and (ii) data associated with said protected computer resources;
at least one access server adapted to receive said identity data from said at least one client computer device;
said at least one access server adapted to forward said identity data received from said at least one client computer device to said at least one authentication server;
said at least one authentication server adapted to authenticate said identity data responsive to a request for said protected computer resources by said at least one client computer device;
said at least one authentication server adapted to authorize said at least one client computer device to receive at least a portion of said protected computer resources, based on said stored data associated with said protected computer resources; and
said at least one authentication server adapted to permit access to said at least a portion of said protected computer resources upon successfully authenticating said identity data and upon successfully authorizing said at least once client computer device.
3 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A system for controlling access to protected computer resources provided via a network utilizing at least one Internet Protocol. The system includes at least one authentication server and at least one access server. The at least one authentication server is adapted to authenticate identity data associated with at least one client computer device, is adapted to authorize the at least one client computer device to receive at least a portion of protected computer resources, and is adapted to permit access to the at least a portion of the protected computer resources. The at least one access server is adapted to receive the identity data associated with the at least one client computer device and forward the identity data associated with the at least one claim computer device to the at least one authentication server.
204 Citations
97 Claims
-
1. A system for controlling access to protected computer resources provided via a network utilizing at least one Internet Protocol, the system comprising:
-
at least one authentication server having an associated database to store (i) identity data associated with at least one client computer device, and (ii) data associated with said protected computer resources; at least one access server adapted to receive said identity data from said at least one client computer device; said at least one access server adapted to forward said identity data received from said at least one client computer device to said at least one authentication server; said at least one authentication server adapted to authenticate said identity data responsive to a request for said protected computer resources by said at least one client computer device; said at least one authentication server adapted to authorize said at least one client computer device to receive at least a portion of said protected computer resources, based on said stored data associated with said protected computer resources; and said at least one authentication server adapted to permit access to said at least a portion of said protected computer resources upon successfully authenticating said identity data and upon successfully authorizing said at least once client computer device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A system for controlling access to protected computer resources provided via a network utilizing at least one Internet Protocol, the system comprising:
-
at least one authentication server having an associated database to store (i) identity data of at least one access server, (ii) identity data associated with at least one client computer device, and (iii) data associated with said protected computer resources; said at least one access server adapted to receive said identity data from said at least one client computer device; said access server adapted to forward said identity data of said at least one access server and said identity data associated with said at least one client computer device received from said at least one client computer device to said at least one authentication server; said at least one authentication server adapted to authenticate said identity data of said at least one access server and said identity data associated with said at least one client computer device responsive to a request for said protected computer resources by said at least one client computer device; said at least one authentication server adapted to authorize said at least one client computer device to receive at least a portion of said protected computer resources, based on said stored data associated with said protected computer resources; and said at least one authentication server adapted to permit access to said at least said portion of said protected computer resources upon successfully authenticating said identity data of said access server and said identity data associated with said at least one client computer device, and upon successfully authorizing said at least once client computer device. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74)
-
-
75. A system for controlling access to protected computer resources provided via a network utilizing at least one Internet Protocol, the system comprising:
-
at least one authentication server having an associated database to store (i) identity data of at least one access server, (ii) identity data of a subscriber identity module associated with at least one client computer device, and (iii) authorization data associated with said protected computer resources; said at least one authentication server adapted to register said identity data of a subscriber identity module associated with said at least one client computer device; said at least one access server adapted to receive (i) said identity data of a subscriber identity module associated with said at least one client computer device and (ii) a request for said protected computer resources from said at least one client computer device; said at least one client computer device adapted to receive an acknowledgement for said request for said protected computer resources from said at least one access server; said at least one access server adapted to forward (i) said identity data of said at least one access server and (ii) said identity data of a subscriber identity module received from said at least one client computer device to said at least one authentication server; said at least one authentication server adapted to authenticate (i) said identity data of said at least one access server and (ii) said identity data of a subscriber identity module associated with said at least one client computer device responsive to a request for said protected computer resources by said at least one client computer device; said at least one authentication server adapted to authorize said at least one client computer device to receive at least a portion of said protected computer resources, based on said stored authorization data associated with said protected computer resources; said at least one authentication server adapted to permit access to said at least said portion of said protected computer resources (i) upon successfully authenticating said identity data of said access server and said identity data of a subscriber identity module associated with said at least one client computer device, and (ii) upon successfully authorizing said at least one client computer device; at least one of said at least one access server and a server associated with said at least one authentication server adapted to acquire, for billing purposes, usage data of said at least a portion of said protected computer resources provided to said at least one client computer device; and said at least one authentication server adapted to re-authenticate said identity data of a subscriber identity module associated with said at least one client computer device. - View Dependent Claims (76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97)
-
Specification