Dynamic cache lookup based on dynamic data
First Claim
1. A method of caching authentication data on a computer network, comprising the steps of:
- authenticating a logon user based on dynamic security attributes;
computing a unique cache lookup key from the dynamic security attributes.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for tracking user security credentials in a distributed computing environment. The security credentials of an authenticated user includes not just his unique user identifier, but also a set of security attributes such as the time of authentication, the location where the user is authenticated (i.e., intranet user v. internet user), the authentication strength, and so on. The security attributes are used in access control decisions. The same user can be given different authorization if he has a different security attribute value. Security credentials may be generated either by WebSphere security code or by third party security provider code. This invention stores the user credentials in a distributed cache and provides a system and method to compute the unique key based on the dynamic security credentials for cache lookup
-
Citations
23 Claims
-
1. A method of caching authentication data on a computer network, comprising the steps of:
-
authenticating a logon user based on dynamic security attributes;
computing a unique cache lookup key from the dynamic security attributes. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for authenticating a user, comprising:
-
a server that generates a token that can be used to identify a unique lookup key for cached security attributes of the user wherein the security credentials include dynamic security attributes. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product in a computer readable medium, comprising:
-
first instructions for authenticating a logon user based on dynamic security attributes;
second instructions for computing a unique cache lookup key from the dynamic security attributes. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification