Automatically re-authenticating a computing device seeking access to a network or a resource. A method comprises forwarding a request received from the computing device to an authentication device to enable the authentication device to authenticate the computing device using a full-authentication mechanism. State information related to authenticating the computing device is created from authenticating the computing device. The state information is received and stored. For example, an authenticator device that forwarded the initial authentication request from the computing device to the authentication device receives and stores the state information. The computing device is re-authenticated using the stored state information without again contacting the authentication device.

 
Web www.patentalert.com

< Hair styling iron

< Systems, methods and apparatus for verification of knowledge-based systems

> System for providing secure and trusted computing environments

> Leveraging markup language data for semantically labeling text strings and data and for providing actions based on semantically labeled text strings and data

~ 00606