Patent application number | Description | Published |
20090132682 | System and Method for Secure Configuration of Network Attached Devices - A system and method for supplying, to a provider of the device, requirements for information to be stored on a device, obtaining device data for provisioning the device on a network, storing device configuration information on storage associated with the network, receiving a service request from a user of the device, detecting attachment of the device to the network, authenticating the device utilizing a device identifier and shared credentials to enable the device to be configured without storing a network address for configuration in the device, providing network information to the device, and providing configuration information to the device. | 05-21-2009 |
20110004615 | SYSTEM FOR AND METHOD OF DISTRIBUTING DEVICE INFORMATION IN AN INTERNET PROTOCOL MULTIMEDIA SUBSYSTEM (IMS) - A system for and method of distributing device information in an Internet Protocol Multimedia Subsystem (IMS) is presented. The system and method may include storing at least one of public identification information and device identification information associated with an end-user device. The system and method may also include receiving, from an application system, a query for device information associated with the end-user device via a network. The system and method may further include retrieving, from a device database, the device information based on the query. The system and method may yet further include outputting, to the application system, the retrieved device information. | 01-06-2011 |
20110225637 | AUTHENTICATION AND AUTHORIZATION OF USER AND ACCESS TO NETWORK RESOURCES USING OPENID - A method includes receiving by an OpenID network device a user log in; logging in, by the OpenID network device, the user to an OpenID account; receiving, by the OpenID network device and from a third party service provider network device, a request to authenticate the user and a request to receive user data associated with the user; providing, by the OpenID network device, a user interface to an end device to allow the user to confirm his/her sign-in to the third party service provider network device and release of the user data; receiving, by the OpenID network device, a confirmation with regard to the user's sign-in to the third party service provider network device and release of the user data; and sending, by the OpenID network device and to the third party service provider network device, a message indicating that the user is authenticated and the user data. | 09-15-2011 |
20120144202 | SECURE AUTHENTICATION FOR CLIENT APPLICATION ACCESS TO PROTECTED RESOURCES - An authorization server receives a request for an access token, for accessing a protected resource, from a client application executing on a device, wherein the request includes a client identifier that uniquely identifies the client application and a device identifier that uniquely identifies the device. The authorization server performs authentication of the client identifier and the device identifier. The authorization server returns a valid access token to the client application, based on the authentication of the client identifier and the device identifier, to enable the client application access to the protected resource. | 06-07-2012 |
20120240211 | POLICY-BASED AUTHENTICATION - A device receives a request to authenticate an end user of a user device based on a requested use of an application by the user device, and communicates with an authentication client, provided in the user device, to perform an authentication requested by the request. The device also generates a response to the request based on the communication with the authentication client, where the response indicates that the end user is or is not authenticated to use the application. The device further provides the response to an application server device hosting the application. | 09-20-2012 |
20130139235 | APPLICATION-BASED CREDENTIAL MANAGEMENT FOR MULTIFACTOR AUTHENTICATION - A device receives a request to authenticate an end user of a user device to use an application, based on an application identifier and a user identifier included the request, and determines whether the application is authenticated based on the application identifier. The device also determines whether the user device is authenticated based on the user identifier and utilizing a generic bootstrapping architecture (GBA) authentication procedure, and determines whether the end user is authenticated based on a personal identification number (PIN) associated with the end user. The device further provides, to an application server device hosting the application, results of the authentications of the application, the user device, and the end user. | 05-30-2013 |
20130318581 | MULTI-FACTOR AUTHENTICATION USING A UNIQUE IDENTIFICATION HEADER (UIDH) - A system is configured to receive, from a user device, information associated with a request to receive a service from a server device, the information including a unique identifier, an identifier, associated with a user of the user device, being encoded with a key to obtain the unique identifier. The system may also be configured to extract the unique identifier from the information; retrieve, from a memory, the identifier, associated with the user, that corresponds to the unique identifier; obtain an indication whether the identifier, associated with the user, is trusted; perform one or more additional authentication operations on the user when the identifier, associated with the user, is trusted; and transmit, to the server device, a notification that indicates that the user is authenticated when the one or more additional authentication operations indicate that the user device is authenticated. | 11-28-2013 |
20140053242 | MANAGEMENT OF PRIVATE INFORMATION - A network device is configured to receive a request, from a device, for private information associated with a user of a user device, on behalf of another user device. The network device may authenticate the device, the user device, and the other user device. The network device may request and receive the user's authorization to send the private information to the other user device. The network device may generate and send a token used to request the private information. The network device may receive the token from the device, determine that the token is valid, and send the private information. | 02-20-2014 |
20150033330 | COLLECTION AND ANALYSIS OF CUSTOMER DATA FROM APPLICATION PROGRAMMING INTERFACE USAGE - A device may receive a request for analytics information associated with a user device. The device may retrieve application programming interface (API) information associated with the request for analytics information. The API information may include information associated with providing an authorization token and with providing user device information. The device may determine demographic information based on the request for analytics information. The demographic information may be associated with a user of the user device. The device may determine the analytics information based on an analysis of the API information and the demographic information. The device may provide the analytics information. | 01-29-2015 |