최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0752036 (2013-01-28) |
등록번호 | US-8661512 (2014-02-25) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 0 인용 특허 : 288 |
A method for controlling access to protected computer resources provided via an Internet Protocol network that includes registering identity data of a subscriber identity module associated with at least one client computer device; storing (i) identity data of at least one access server, (ii) the ide
A method for controlling access to protected computer resources provided via an Internet Protocol network that includes registering identity data of a subscriber identity module associated with at least one client computer device; storing (i) identity data of at least one access server, (ii) the identity data of a subscriber identity module, and (iii) authorization data regarding the protect computer resources; receiving the identity data of a subscriber identity module, and a request for the protected computer resources; authenticating (i) the identity data of the at least one access server, and (ii) the identity data of a subscriber identity module; authorizing the at least one client computer device to receive at least a portion of the protected computer resources; and permitting access to the at least the portion of the protected computer resources (i) upon successfully authenticating the identity data of the at least one access server and the identity data of a subscriber identity module associated with the at least one client computer device, and (ii) upon successfully authorizing the at least one client computer device.
1. A method for controlling access to protected computer resources provided via a network utilizing at least one Internet Protocol, the method comprising: registering, by at least one authentication server, identity data of a subscriber identity module associated with at least one client computer de
1. A method for controlling access to protected computer resources provided via a network utilizing at least one Internet Protocol, the method comprising: registering, by at least one authentication server, identity data of a subscriber identity module associated with at least one client computer device;storing, by the at least one authentication server in an associated database, (i) identity data of at least one access server, (ii) the identity data of a subscriber identity module associated with the at least one client computer device, and (iii) authorization data associated with the protected computer resources;receiving, by the at least one access server, (i) the identity data of a subscriber identity module associated with the at least one client computer device and (ii) a request for the protected computer resources from the at least one client computer device;receiving, by the at least one client computer device, an acknowledgement for the request for the protected computer resources from the at least one access server;forwarding, by the at least one access server, (i) the identity data of the at least one access server and (ii) the identity data of a subscriber identity module received from the at least one client computer device to the at least one authentication server;authenticating, by the at least one authentication server, (i) the identity data of the at least one access server and (ii) the identity data of a subscriber identity module associated with the at least one client computer device responsive to the request for the protected computer resources by the at least one client computer device;authorizing, by the at least one authentication server, the at least one client computer device to receive at least a portion of the protected computer resources, based on the stored authorization data associated with the protected computer resources;permitting access, by the at least one authentication server, to the at least the portion of the protected computer resources (i) upon successfully authenticating the identity data of the at least one access server and the identity data of a subscriber identity module associated with the at least one client computer device, and (ii) upon successfully authorizing the at least one client computer device; andacquiring, by at least one of the at least one access server and a server associated with the at least one authentication server, for billing purposes, usage data of the at least the portion of the protected computer resources provided to the at least one client computer device. 2. The method of claim 1, further comprising authenticating, by the at least one client computer device, the at least one access server. 3. The method of claim 1, further comprising receiving, by the at least one access server, at least one of a username and a password in addition to the identity data of a subscriber identity module associated with the at least one client computer device. 4. The method of claim 1, further comprising authenticating, by the at least one authentication server, the at least one of a username and password. 5. The method of claim 1, wherein the at least one access server receives the identity data of a subscriber identity module associated with the at least one client computer device via a network utilizing at least one Internet Protocol. 6. The method of claim 1, wherein the storing of the authorization data associated with the protected computer resources is stored in a database of at least one server computer associated with the at least one authentication server. 7. The method of claim 1, wherein the at least the portion of the protected computer resources are provided via a network utilizing at least one Internet Protocol to the at least one client computer device by at least one server computer associated with the at least one access server upon the at least one authentication server permitting access to the at least the portion of the protected computer resources. 8. The method of claim 1, wherein the at least the portion of the protected computer resources are stored in at least one of a plurality of server computers associated with the at least one access server. 9. The method of claim 1, wherein the at least the portion of the protected computer resources are stored in a database associated with the at least one access server. 10. The method of claim 1, wherein at least one of a plurality of server computers associated with the at least one access server provides the at least the portion of the protected computer resources to the at least one client computer device upon the at least one authentication server permitting access to the at least the portion of the protected computer resources. 11. The method of claim 1, wherein the at least the portion of the protected computer resources is encrypted. 12. The method of claim 1, wherein the at least one authentication server is located on a computer separate from the at least one access server. 13. The method of claim 1, wherein the at least one authentication server is located on the same computer as the at least one access server. 14. The method of claim 1, wherein at least one of the functions of the at least one authentication server are performed by another server associated with the at least one authentication server. 15. The method of claim 1, wherein the at least one authentication server authenticates multiple client computer devices. 16. The method of claim 1, wherein the at least one authentication server authenticates multiple access servers. 17. The method of claim 1, wherein the at least one authentication server is one of a plurality of servers authenticating the identity data of a subscriber identity module associated with the at least one client computer device. 18. The method of claim 1, wherein the at least one authentication server is one of a plurality of servers authorizing the at least one client computer device to receive at least the portion of the protected computer resources. 19. The method of claim 1, wherein the at least one authentication server is one of a plurality of servers permitting access to the at least the portion of the protected computer resources. 20. The method of claim 1, further comprising assigning, at the at least one authentication server, one of a plurality of authorization levels to the at least the portion of the protected computer resources, assigning, at the at least one authentication server, a particular authorization level to the identity data of a subscriber identity module associated with the at least one client computer device, and permitting, by the at least one authentication server, only access to particular protected computer resources by the at least one client computer device permitted by the particular authorization level. 21. The method of claim 1, further comprising selectively requiring, by the at least one access server, the at least one client computer device to forward the identity data of a subscriber identity module associated with the at least one client computer device to the at least one access server. 22. The method of claim 1, further comprising selectively prompting, by the at least one access server, the at least one client computer device to provide the identity data of a subscriber identity module associated with the at least one client computer device and at least one of a username and a password to the at least one access server. 23. The method of claim 1, further comprising selectively querying, by the at least one access server, the at least one client computer device to one of derive and generate the identity data of a subscriber identity module associated with the at least one client computer device. 24. The method of claim 1, further comprising changing the identity data of a subscriber identity module associated with the at least one client computer device, and forwarding the changed identity data of a subscriber identity module associated with the at least one client computer device to the at least one authentication server. 25. The method of claim 1, further comprising intermittently re-authenticating, by the at least one authentication server, the identity data of a subscriber identity module associated with the at least one client computer device. 26. A method for controlling access to protected computer resources provided via a network utilizing at least one Internet Protocol, the method comprising: registering, by at least one authentication server, digital identification of an access key associated with at least one client computer device;storing, by the at least one authentication server i n an associated database, (i) identity data of at least one access server, (ii) the digital identification of an access key associated with the at least one client computer device, and (iii) authorization data associated with the protected computer resources;receiving, by the at least one access server, (i) the digital identification of an access key associated with the at least one client computer device and (ii) a request for the protected computer resources from the at least one client computer device;receiving, by the at least one client computer device, an acknowledgement for the request for the protected computer resources from the at least one access server;forwarding, by the at least one access server, (i) the identity data of the at least one access server and (ii) the digital identification of an access key received from the at least one client computer device to the at least one authentication server;authenticating, by the at least one authentication server, (i) the identity data of the at least one access server and (ii) the digital identification of an access key associated with the at least one client computer device responsive to the request for the protected computer resources by the at least one client computer device;authorizing, by the at least one authentication server, the at least one client computer device to receive at least the portion of the protected computer resources, based on the stored authorization data associated with the protected computer resources;permitting access, by the at least one authentication server, to the at least a portion of the protected computer resources (i) upon successfully authenticating the identity data of the at least one access server and the digital identification of an access key associated with the at least one client computer device, and (ii) upon successfully authorizing the at least one client computer device; andacquiring, by at least one of the at least one access server and a server associated with the at least one authentication server, for billing purposes, usage data of the at least the portion of the protected computer resources provided to the at least one client computer device. 27. The method of claim 26, further comprising authenticating, by the at least one client computer device, the at least one access server. 28. The method of claim 26, further comprising receiving, by the at least one access server, at least one of a username and a password in addition to the digital identification of an access key associated with the at least one client computer device. 29. The method of claim 26, further comprising authenticating, by the at least one authentication server, the at least one of a username and password. 30. The method of claim 26, wherein the at least one access server receives the digital identification of an access key associated with the at least one client computer device via a network utilizing at least one Internet Protocol. 31. The method of claim 26, wherein the storing of the authorization data associated with the protected computer resources is stored in a database of at least one server computer associated with the at least one authentication server. 32. The method of claim 26, wherein the at least the portion of the protected computer resources are provided via a network utilizing at least one Internet Protocol to the at least one client computer device by at least one server computer associated with the at least one access server upon the at least one authentication server permitting access to the at least the portion of the protected computer resources. 33. The method of claim 26, wherein the at least the portion of the protected computer resources are stored in at least one of a plurality of server computers associated with the at least one access server. 34. The method of claim 26, wherein the at least the portion of the protected computer resources are stored in a database associated with the at least one access server. 35. The method of claim 26, wherein at least one of a plurality of server computers associated with the at least one access server provides the at least the portion of the protected computer resources to the at least one client computer device upon the at least one authentication server permitting access to the at least the portion of the protected computer resources. 36. The method of claim 1, wherein the at least the portion of the protected computer resources is encrypted. 37. The method of claim 26, wherein the at least one authentication server is located on a computer separate from the at least one access server. 38. The method of claim 26, wherein the at least one authentication server is located on the same computer as the at least one access server. 39. The method of claim 26, wherein at least one of the functions of the at least one authentication server are performed by another server associated with the at least one authentication server. 40. The method of claim 26, wherein the at least one authentication server authenticates multiple client computer devices. 41. The method of claim 26, wherein the at least one authentication server authenticates multiple access servers. 42. The method of claim 26, wherein the at least one authentication server is one of a plurality of servers authenticating the digital identification of an access key associated with the at least one client computer device. 43. The method of claim 26, wherein the at least one authentication server is one of a plurality of servers authorizing the at least one client computer device to receive at least the portion of the protected computer resources. 44. The method of claim 26, wherein the at least one authentication server is one of a plurality of servers permitting access to the at least the portion of the protected computer resources. 45. The method of claim 26, further comprising assigning, at the at least one authentication server, one of a plurality of authorization levels to the at least the portion of the protected computer resources, assigning, at the at least one authentication server, a particular authorization level to the digital identification of an access key associated with the at least one client computer device, and permitting, by the at least one authentication server, only access to particular protected computer resources by the at least one client computer device permitted by the particular authorization level. 46. The method of claim 26, further comprising selectively requiring, by the at least one access server, the at least one client computer device to forward the digital identification of an access key associated with the at least one client computer device to the at least one access server. 47. The method of claim 26, further comprising selectively prompting, by the at least one access server, the at least one client computer device to provide the digital identification of an access key associated with the at least one client computer device and at least one of a username and a password to the at least one access server. 48. The method of claim 26, further comprising selectively querying, by the at least one access server, the at least one client computer device to one of derive and generate the digital identification of an access key associated with the at least one client computer device. 49. The method of claim 1, further comprising changing the digital identification of an access key associated with the at least one client computer device, and forwarding the changed digital identification of an access key associated with the at least one client computer device to the at least one authentication server. 50. The method of claim 26, further comprising intermittently re-authenticating, by the at least one authentication server, the digital identification of an access key associated with the at least one client computer device.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.