MANAGEMENT OF USER AUTHENTICATION
First Claim
1. A method for managing user authentication, said method comprising:
- receiving from a first authentication mechanism, first authentication data associated with a user, wherein the first authentication data is generated in response to the first authentication mechanism successfully authenticating the user;
registering, in response to receipt of the first authentication data, a first identifier associated with the user;
associating the first authentication data with the first identifier;
receiving from a second authentication mechanism, in response to said associating the first authentication data with the first identifier, second authentication data associated with the user, wherein the second authentication data is generated in response to the second authentication mechanism successfully authenticating the user; and
associating the second authentication data with the first authentication data and the first identifier.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for managing user authentication. First authentication data associated with a user is received from a first authentication mechanism. The first authentication data is generated in response to the first authentication mechanism successfully authenticating the user. In response to receipt of the first authentication data, a first identifier associated with the user is registered. The first authentication data is associated with the first identifier. In response to associating the first authentication data with the first identifier, second authentication data associated with the user is received from a second authentication mechanism. The second authentication data is generated in response to the second authentication mechanism successfully authenticating the user. The second authentication data is associated with the first authentication data and the first identifier.
32 Citations
20 Claims
-
1. A method for managing user authentication, said method comprising:
-
receiving from a first authentication mechanism, first authentication data associated with a user, wherein the first authentication data is generated in response to the first authentication mechanism successfully authenticating the user; registering, in response to receipt of the first authentication data, a first identifier associated with the user; associating the first authentication data with the first identifier; receiving from a second authentication mechanism, in response to said associating the first authentication data with the first identifier, second authentication data associated with the user, wherein the second authentication data is generated in response to the second authentication mechanism successfully authenticating the user; and associating the second authentication data with the first authentication data and the first identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 12)
-
-
11. The method of claim 11, said method further comprising:
performing an action in response to the first authentication data being associated with the first identifier and a fourth identifier, wherein the fourth identifier is registered with the user, wherein the first identifier is different from the fourth identifier, and wherein said performing the action is selected from the group consisting of associating the first identifier and the fourth identifier, not associating the first identifier and the fourth identifier and generating an alert, and a combination thereof.
-
13. A computer system comprising a processor and a computer readable storage medium, said storage medium containing program code configured to be executed by the processor to implement a method for managing user authentication, said method comprising:
-
receiving from a first authentication mechanism, first authentication data associated with a user, wherein the first authentication data is generated in response to the first authentication mechanism successfully authenticating the user; registering, in response to receipt of the first authentication data, a first identifier associated with the user; associating the first authentication data with the first identifier; receiving from a second authentication mechanism, in response to said associating the first authentication data with the first identifier, second authentication data associated with the user, wherein the second authentication data is generated in response to the second authentication mechanism successfully authenticating the user; and associating the second authentication data with the first authentication data and the first identifier. - View Dependent Claims (14, 15, 16)
-
-
17. A computer program product, comprising a computer readable storage medium having a computer readable program code therein, said computer readable program code comprising an algorithm configured to implement a method for managing user authentication, said method comprising:
-
receiving from a first authentication mechanism, first authentication data associated with a user, wherein the first authentication data is generated in response to the first authentication mechanism successfully authenticating the user; registering, in response to receipt of the first authentication data, a first identifier associated with the user; associating the first authentication data with the first identifier; receiving from a second authentication mechanism, in response to said associating the first authentication data with the first identifier, second authentication data associated with the user, wherein the second authentication data is generated in response to the second authentication mechanism successfully authenticating the user; and associating the second authentication data with the first authentication data and the first identifier. - View Dependent Claims (18, 19, 20)
-
Specification