System and method for transparent single sign-on
First Claim
1. A method for providing single sign-on to a user of a first computer in a networked computing environment, the method comprising:
- receiving an authentication request from an operating system of the first computer;
requesting credentials of an application making the authentication request;
authenticating the credentials;
in response to a successful authentication of the credentials,storing the credentials; and
transmitting the credentials to a second computer.
10 Assignments
0 Petitions
Accused Products
Abstract
System and method for transparent single sign-on authentication on computers in a networked environment. A preferred embodiment comprises receiving an authentication request from an operating system of a first computer, requesting credentials of an application making the authentication request, authenticating the credentials, storing the credentials if the authentication is successful, and transmitting the credentials to a second computer. On subsequent access requests made by the user on the second computer, the credentials can be retrieved from the secure store, eliminating the need to prompt the user to re-enter authentication information.
88 Citations
20 Claims
-
1. A method for providing single sign-on to a user of a first computer in a networked computing environment, the method comprising:
-
receiving an authentication request from an operating system of the first computer; requesting credentials of an application making the authentication request; authenticating the credentials; in response to a successful authentication of the credentials, storing the credentials; and transmitting the credentials to a second computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A network computing device comprising:
-
an operating system configured to control interaction between users of the network computing device and applications and data stored in the network computing device; an authentication module coupled to the operating system, the authentication module configured to authenticate credentials of a user of the network computing device prior to granting the user access to applications and data and storing the credentials in a secure storage location, wherein once a user'"'"'s credentials is present in the secure storage location, the user is no longer prompted to re-enter the authentication information; and a single sign-on module coupled to the operating system, the single sign-on module configured to transmit the user'"'"'s credentials to a remotely located networked computing device containing remotely located applications or data and to verify the validity of received credentials. - View Dependent Claims (13, 14, 15)
-
-
16. A networked computing environment comprising:
-
a computer network to convey information and data; at least two network computing devices coupled to the network, each network computing device comprising an operating system configured to control interaction between users of the network computing device and applications and data stored in the network computing device; an authentication module coupled to the operating system, the authentication module configured to authenticate credentials of a user of the network computing device prior to granting the user access to applications and data and storing the credentials in a secure storage location, wherein once a user'"'"'s credentials is present in the secure storage location, the user is no longer prompted to re-enter the authentication information; and a single sign-on module coupled to the operating system, the single sign-on module configured to transmit the user'"'"'s credentials to a remotely located networked computing device containing remotely located applications or data and to verify the validity of received credentials. - View Dependent Claims (17, 18, 19, 20)
-
Specification