| CPC G16H 40/20 (2018.01) [A61M 5/142 (2013.01); A61M 5/172 (2013.01); G06F 12/0802 (2013.01); G06F 16/24552 (2019.01); G16H 20/17 (2018.01); G16H 40/40 (2018.01); G16H 40/60 (2018.01); G16H 40/63 (2018.01); G16H 40/67 (2018.01); G16H 80/00 (2018.01); H04L 43/0811 (2013.01); H04L 43/16 (2013.01); H04L 63/08 (2013.01); H04L 67/125 (2013.01); H04L 67/34 (2013.01); H04L 67/565 (2022.05); H04L 67/5682 (2022.05); H04L 69/08 (2013.01); H04L 69/18 (2013.01); A61M 2005/14208 (2013.01); A61M 2205/18 (2013.01); A61M 2205/3553 (2013.01); A61M 2205/3561 (2013.01); A61M 2205/3584 (2013.01); A61M 2205/3592 (2013.01); A61M 2205/52 (2013.01); H04L 67/10 (2013.01)] | 20 Claims |

|
1. A method for authenticating a network device residing in a network environment, the method comprising:
processing, by a proxy, an authentication request from the network device residing in the network environment, wherein the proxy is in communication with (i) the network device residing in the network environment, and (ii) an authentication system configured to perform authentication based on login requests from a plurality of user devices not residing in the network environment as well as the network device residing in the network environment, wherein the authentication request from the network device includes identifying information associated with the network environment, and wherein the network environment includes one or more devices in communication with the network device;
transmitting login information to the authentication system;
receiving a token from the authentication system; and
transmitting the token to the network device residing in the network environment such that the token is usable by the network device to transmit requests to the authentication system.
|