SECURITY DEVICE PROVISIONING
First Claim
1. A method for provisioning a security token object to a user for accessing a computing resource through a client computer system, the method comprising:
- receiving a security token object provisioning request from the client computer system;
transmitting an authentication request to the client computer system in response to receiving the security token object provisioning request;
authenticating the user against a user identity based upon a set of identity credentials received from the client computer system as provided by the user, the user identity being stored on a data store associated with the computing resource;
initiating the extraction of a unique token identifier from the security token object without intervention from the user in response to a successful authentication of the user; and
associating the unique token identifier received from the client computer system to the user identity in the data store;
wherein the user is authenticated for access to the computing resource based at least partially upon a subsequent validation of the security token object against the unique token identifier retrieved from the data store.
5 Assignments
0 Petitions
Accused Products
Abstract
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a client computer system. A security token object provisioning request may be received from the client computer system. In response, an authentication request may be transmitted. The user is authenticated against a user identity based upon a set of received identity credentials provided by the user. The extraction of a unique token identifier from the security token object is initiated, and completed without intervention from the user. The unique token identifier received from the client computer system is associated with to the user identity in a data store. By providing the security token object, the user can gain access to the computing resource.
41 Citations
19 Claims
-
1. A method for provisioning a security token object to a user for accessing a computing resource through a client computer system, the method comprising:
-
receiving a security token object provisioning request from the client computer system; transmitting an authentication request to the client computer system in response to receiving the security token object provisioning request; authenticating the user against a user identity based upon a set of identity credentials received from the client computer system as provided by the user, the user identity being stored on a data store associated with the computing resource; initiating the extraction of a unique token identifier from the security token object without intervention from the user in response to a successful authentication of the user; and associating the unique token identifier received from the client computer system to the user identity in the data store; wherein the user is authenticated for access to the computing resource based at least partially upon a subsequent validation of the security token object against the unique token identifier retrieved from the data store. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An article of manufacture comprising a program storage medium readable by a data processing apparatus, the medium tangibly embodying one or more programs of instructions executable by the data processing apparatus to perform a method for provisioning a security token object to a user for accessing a computing resource through a client computer system, the method comprising:
-
receiving a security token object provisioning request from the client computer system; transmitting an authentication request to the client computer system in response to receiving the security token object provisioning request; authenticating the user against a user identity based upon a set of identity credentials received from the client computer system as provided by the user, the user identity being stored on a data store associated with the computing resource; initiating the extraction of a unique token identifier from the security token object without intervention from the user in response to a successful authentication of the user; and associating the unique token identifier received from the client computer system to the user identity in the data store; wherein the user is authenticated for access to the computing resource based at least partially upon a subsequent validation of the security token object against the unique token identifier retrieved from the data store.
-
Specification