METHOD AND SYSTEM FOR IMPROVED SECURITY
First Claim
1. A method of providing secure access to a first server for a user, the method comprising:
- at a second server;
receiving a request to authenticate the user for accessing one or more services in a set of services provided by the first server, each service associated with a corresponding security level;
receiving a selection of a particular security level;
receiving a set of security information to authentication the user for the selected particular security level; and
when the received set of security information is validated by the second server, sending a set of credentials from the second server to the first server to authenticate the user on the first server for using the services corresponding to the selected particular security level.
4 Assignments
0 Petitions
Accused Products
Abstract
An improved authentication method and system is provided where a user securely accesses a variety of target servers for online email, online banking, credit card purchases, ecommerce, brokerage services, corporate databases, and online content (movies, music and software). The method involves a bridge server performing authentication tasks that allow a user to access a server or a group of servers with multiple security levels. The method eliminates the need for the user to remember multiple usernames/passwords for each target server. The method also allows one bridge server and one set of security devices to be used to authenticate the user for multiple servers, thereby reducing security costs and increasing user convenience. A location-based password-ID generating device is also described for secure location-based access.
-
Citations
31 Claims
-
1. A method of providing secure access to a first server for a user, the method comprising:
at a second server; receiving a request to authenticate the user for accessing one or more services in a set of services provided by the first server, each service associated with a corresponding security level; receiving a selection of a particular security level; receiving a set of security information to authentication the user for the selected particular security level; and when the received set of security information is validated by the second server, sending a set of credentials from the second server to the first server to authenticate the user on the first server for using the services corresponding to the selected particular security level. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
12. A non-transitory computer readable medium storing a computer program for authenticating a user, the computer program executable by a processing unit, the computer program comprising sets of instructions for:
-
displaying a list of a set of servers; receiving a selection of a particular server in the set of servers; receiving information for authenticating the user to access the particular server; and sending, when the received information is validated, a set of credentials to the particular server to enable the user to access the particular server. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A device for location-based authentication of a user by an authenticating server, the device comprising:
-
a positioning module for determining a set of coordinates for the device; a randomizer for generating a password based on the set of coordinates; a display for displaying the generated password, wherein the generated password is used by the user as one of a set of authentication information to send to the authentication server, wherein the user is authenticated only when the estimated set of coordinates are within a pre-determined threshold. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification