Computer security system
First Claim
1. A method of providing access to an authenticated user and restricting access to an unauthorized user of a computer system, said method comprising the steps of:
- determining whether a user is authenticated to access at least one resource included in the computer system;
establishing-a session and a session identifier such that the user has access to the at least one resource if the user is authenticated to access the at least one resource; and
changing the session identifier each time the user completes an interaction with the computer system during the session.
9 Assignments
0 Petitions
Accused Products
Abstract
A method of providing access to an authenticated user, and restricting access to an unauthorized user, of a computer system, is provided. The method includes determining whether a user is authenticated to access at least one resource included in the computer system. The method also includes establishing a session and a session identifier such that the user has access to the at least one resource if the user is authenticated to access the at least one resource. The method also includes changing the session identifier each time the user completes an interaction with the computer system during the session.
159 Citations
21 Claims
-
1. A method of providing access to an authenticated user and restricting access to an unauthorized user of a computer system, said method comprising the steps of:
-
determining whether a user is authenticated to access at least one resource included in the computer system;
establishing-a session and a session identifier such that the user has access to the at least one resource if the user is authenticated to access the at least one resource; and
changing the session identifier each time the user completes an interaction with the computer system during the session. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer system comprising;
-
a microprocessor; and
a computer readable medium including computer program instructions which cause the computer system to implement a method of providing access to an authenticated user and restricting access to an unauthorized user of a computer system, the method comprising the steps of;
determining whether a user is authenticated to access at least one resource included in the computer system;
establishing a session and a session identifier such that the user has access to the at least one resource if the user is authenticated to access the at least one resource; and
changing the session identifier each time the user completes an interaction with the computer system during the session. - View Dependent Claims (17, 18)
-
-
19. A computer readable carrier including computer program instructions which cause a computer to implement a method of providing access to an authenticated user and restricting access to an unauthorized user of a computer system, the method comprising the steps of:
-
determining whether a user is authenticated to access at least one resource included in the computer system;
establishing a session and a session identifier such that the user has access to the at least one resource if the user is authenticated to access the at least one resource; and
changing the session identifier each time the user completes an interaction with the computer system during the session. - View Dependent Claims (20, 21)
-
Specification