Methods and System for Storing and Retrieving Identity Mapping Information
First Claim
Patent Images
1. Method for storing identity mapping information in an identity management system for enabling a user authenticated at a first domain to access a second domain, the method comprising:
- digitally signing the identity mapping information by the user;
providing the mapping information to the identity management system; and
storing the user-signed mapping information after being further digitally signed by the identity management system.
1 Assignment
0 Petitions
Accused Products
Abstract
System and method for storing identity mapping information in an identity management system to enable a user authenticated at a first domain to access a second domain. The method may include digitally signing the identity mapping information by the user; providing the mapping information to an identity management system; and storing the user-signed mapping information after being further digitally signed by the identity management system.
-
Citations
20 Claims
-
1. Method for storing identity mapping information in an identity management system for enabling a user authenticated at a first domain to access a second domain, the method comprising:
-
digitally signing the identity mapping information by the user; providing the mapping information to the identity management system; and storing the user-signed mapping information after being further digitally signed by the identity management system. - View Dependent Claims (2, 3, 4)
-
-
5. A method for retrieving identity mapping information from an identity management system for enabling a user authenticated at a first domain to access a second domain, the method comprising:
-
retrieving user-signed mapping information, which has further been digitally signed by the identity management system; validating the digital signature of the identity management system; and validating the digital signature of the user; wherein after said validating the digital signature of the identity management system and said validating the digital signature of the user, the user may be authenticated to access the second domain. - View Dependent Claims (6, 7, 8, 9, 10)
-
-
11. A computer accessible memory medium comprising program instructions for storing identity mapping information in an identity management system for enabling a user authenticated at a first domain to access a second domain, wherein the program instructions are executable by a processor to:
-
digitally sign the identity mapping information by the user; provide the mapping information to the identity management system; and store the user-signed mapping information after being further digitally signed by the identity management system. - View Dependent Claims (12, 13, 14)
-
-
15. A memory medium comprising program instructions for retrieving identity mapping information from an identity management system for enabling a user authenticated at a first domain to access a second domain, wherein the program instructions are executable by a processor to:
-
retrieve user-signed mapping information, which has further been digitally signed by the identity management system; validate the digital signature of the identity management system; and validate the digital signature of the user; wherein after said validating the digital signature of the identity management system and said validating the digital signature of the user, the user may be authenticated to access the second domain. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification