System aand method for authentication to an application
First Claim
1. A method for authenticating a first user in a protected network to an application shared simultaneously with a second user in an unprotected network, said method comprising the steps of:
- the first user supplying a userID and a password to a first server within said protected network for authentication for said application, said application residing in a third network;
said first server checking authentication of said first user based on said userID and password, and if said first user is authentic, said first server forwarding to said application an authentication key for said first user and a selection by said first user pertaining to said application; and
said application checking authentication of said key, and if authentic, complying with said selection by said first user.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authenticating a first user in a protected network to an application in a DMZ network shared simultaneously with a second user in an unprotected network. The protected network and the DMZ network are both controlled by a same entity. The first user supplies a userID and a password to a first server within the protected network for authentication for the application. The first server checks authentication of the first user based on the userID and password. If the first user is authentic, the first server forwards to the application an authentication key for the first user and a selection by the first user pertaining to the application. The application checks authentication of the key, and if authentic, complies with the selection by the first user. The second user supplies another userID and another password to the application. If the other userID and other password are authentic, the application complies with a selection made by the second user pertaining to the application.
49 Citations
22 Claims
-
1. A method for authenticating a first user in a protected network to an application shared simultaneously with a second user in an unprotected network, said method comprising the steps of:
-
the first user supplying a userID and a password to a first server within said protected network for authentication for said application, said application residing in a third network;
said first server checking authentication of said first user based on said userID and password, and if said first user is authentic, said first server forwarding to said application an authentication key for said first user and a selection by said first user pertaining to said application; and
said application checking authentication of said key, and if authentic, complying with said selection by said first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A authentication system comprising:
-
an application on a first server in a first network;
a second server in a second, protected network to receive from a first user within said second network a userID and a password for authentication for said application, said second server checking authentication of said first user based on said userID and password, and if said first user is authentic, said second server forwarding to said application an authentication key for said first user and a selection by said first user pertaining to said application; and
said application checking authentication of said key, and if authentic, complying with said selection by said first user; and
a workstation in a third, unprotected network for a second user, said application being shared simultaneously with said first and second users. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A computer program product for authenticating a first user in a protected network to an application shared simultaneously with a second user in an unprotected network, said program product comprising:
-
a computer readable medium;
first program instructions, to execute on a first server within said protected network, to receive from the first user a userID and a password for authentication for said application, said application residing in a third network;
second program instructions, to execute on said first server, to check authentication of said first user based on said userID and password, and if said first user is authentic, to forward to said application an authentication key for said first user and a selection by said first user pertaining to said application; and
third program instructions in said application to check authentication of said key, and if authentic, comply with said selection by said first user; and
wherein said first, second and third program instructions are recorded on said medium. - View Dependent Claims (22)
-
Specification