TWO-FACTOR AUTHENTICATION
First Claim
1. A computer-implemented method for providing two-factor authentication for a secured system in an infrastructure operating environment, the method comprising:
- i. receiving, from a user, a request to access the secured system, wherein the request comprises a first authentication information and a second authentication information;
ii. authenticating, using a two-factor authentication protocol, the user based on the first and second authentication information;
iii. in response to a positive authentication result, configuring a firewall gateway to allow access by the user to the secured system; and
iv. in response to a negative authentication result, configuring the firewall gateway to prevent access by the user to the secured system.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and processes for providing two-factor authentication to systems capable of implementing varying levels of access control are disclosed. The system may include an authentication and access control system that selectively grants access to a secured system or network. The authentication and access control system implements a two-factor authentication routine and may configure a firewall gateway to grant or deny access to the secured system or network based on the results of the two-factor authentication. A user may connect to the authentication and access control system via a VPN. By separating the user from the secured system or network, the authentication and access control system can provide two-factor authentication for the secured system regardless of the secured system'"'"'s own cyber security capabilities. This is particularly useful for legacy systems in infrastructure operating environments that are incapable of implementing a more sophisticated access control protocol, such as two-factor authentication.
22 Citations
26 Claims
-
1. A computer-implemented method for providing two-factor authentication for a secured system in an infrastructure operating environment, the method comprising:
-
i. receiving, from a user, a request to access the secured system, wherein the request comprises a first authentication information and a second authentication information; ii. authenticating, using a two-factor authentication protocol, the user based on the first and second authentication information; iii. in response to a positive authentication result, configuring a firewall gateway to allow access by the user to the secured system; and iv. in response to a negative authentication result, configuring the firewall gateway to prevent access by the user to the secured system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for providing two-factor authentication to a secured system in an infrastructure operating environment, the system comprising:
-
one or more electronic assets; and a unified threat management device for controlling access to the one or more electronic assets, wherein the unified threat management device is configured to; receive, from a user, a request to access an electronic asset of the one or more electronic assets, wherein the request comprises a first authentication information and a second authentication information; authenticate, using a two-factor authentication protocol, the user based on the first and second authentication information; in response to a positive authentication result, configure a firewall gateway to allow access by the user to the electronic asset of the one or more electronic assets; and in response to a negative authentication result, configure the firewall gateway to prevent access by the user to the electronic asset of the one or more electronic assets. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer-readable storage medium comprising program code for providing two-factor authentication for a secured system in an infrastructure operating environment, the program code for:
-
i. receiving, from a user, a request to access the secured system, wherein the request comprises a first authentication information and a second authentication information; ii. authenticating, using a two-factor authentication protocol, the user based on the first and second authentication information; iii. in response to a positive authentication result, configuring a firewall gateway to allow access by the user to the secured system; and iv. in response to a negative authentication result, configuring the firewall gateway to prevent access by the user to the secured system. - View Dependent Claims (22, 23, 24, 25, 26)
-
Specification