Authentication server auditing of clients using cache provisioning
First Claim
Patent Images
1. A computer-implemented method for authentication server auditing of clients, comprising:
- receiving an authentication request for authenticating a client, wherein the authentication request comprises affinity information for approximating a physical locality of the client, and wherein the affinity information is unknown to the client for which the authentication request is made;
logging information associated with the authentication request in response to a successful authentication; and
in response the logged information, dynamically granting security data based on the logged information.
2 Assignments
0 Petitions
Accused Products
Abstract
Sharing resources on a network include, for example, a domain controller hierarchy scheme, which is used in some implementations to organize and share both secure and non-secure resources in an efficient manner. Using authentication information can be used to architect a trustworthy system to divulging sensitive client data (such as user/computer passwords) to a host system. The sensitive client data can be released to the host system when a client establishes a relationship having a degree of trust with the host.
-
Citations
20 Claims
-
1. A computer-implemented method for authentication server auditing of clients, comprising:
-
receiving an authentication request for authenticating a client, wherein the authentication request comprises affinity information for approximating a physical locality of the client, and wherein the affinity information is unknown to the client for which the authentication request is made; logging information associated with the authentication request in response to a successful authentication; and in response the logged information, dynamically granting security data based on the logged information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for authentication server auditing of clients, comprising:
-
a host for receiving and forwarding an authentication request from a client, wherein the authentication request comprises affinity information for approximating a physical locality of the client, a server for receiving and authenticating the authentication request forwarded from the client; and a cache that is associated with the host for persisting information associated with a successfully authenticated authentication requested. - View Dependent Claims (17)
-
-
18. A tangible medium comprising computer-executable instructions for:
-
receiving an authentication request for authentication of a client, wherein the authentication request comprises affinity information, and wherein the affinity information is unknown to the client for which the authentication request is made; logging information associated with the authentication request in response to a successful authentication; and in response the logged information, dynamically granting security data based on the logged information. - View Dependent Claims (19, 20)
-
Specification