×

Techniques for facilitating secure, credential-free user access to resources

  • US 10,223,549 B2
  • Filed: 12/16/2015
  • Issued: 03/05/2019
  • Est. Priority Date: 01/21/2015
  • Status: Active Grant
First Claim
Patent Images

1. A cloud-based credential management apparatus comprising:

  • one or more non-transitory computer readable storage media; and

    program instructions that when executed by one or more processors communicatively coupled to memory, direct the one or more processors to;

    detect a protected resource access request initiated by a shell executing on a resource access system, wherein the protected resource access request comprises a modified SSH key that uniquely identifies a user;

    process the protected resource access request to identify the user and a protected resource that the user is attempting to access, wherein the protected resource and the credential management apparatus are different entities;

    identify a predetermined authentication policy associated with the protected resource;

    generate a request for authentication information based on the authentication policy associated with the protected resource;

    send the request for authentication information for delivery to a mobile device associated with the user, wherein the mobile device and the resource access system are different entities;

    receive a response to the request for authentication sent by the mobile device;

    process the response to the request for authentication to determine that the authentication policy is satisfied; and

    in response to determining that the authentication policy is satisfied,generate a response to the protected resource access request including login credentials to access the protected resource;

    establish a first secure session between the resource access system and the cloud-based credential management apparatus;

    send the response to the protected resource access request for delivery to the protected resource;

    establish a second secure session between the cloud-based credential management apparatus and the protected resource; and

    join the first secure session and the second secure session to establish a secure communication link between the resource access system and the protected resource.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×