CONSOLIDATED AUTHENTICATION
First Claim
1. A method for authenticating a user at a first computer to first and second applications installed in a second computer, the method comprising:
- said second computer receiving from the user a first request to access the first application, and in response, the second computer redirecting the first request to a third computer, and in response, the third computer determining that the user was previously authenticated and notifying the second computer that the user is authentic, and in response, the second computer returning a first session key to the third computer, said first session key enabling a session with the first application but not with the second application, said first, second, and third computers being three different computers, said first and second applications installed in the second computer being different applications; and
said second computer receiving from the user a second request with a second session key to access the first application, the second application, or both the first application and the second application, and in response the second computer determining that the user is authentic and notifying the first application, the second application, or both the first application and the second application that the user is authentic so that the first application, the second application, or both the first application and the second application can send, to the first computer, a response to the second request,wherein the second session key was generated by the third computer, and sent by the third computer to the first computer, prior to the second computer having received the second request and in response to the third computer having received the first session key, andwherein the second session key enables a session with both the first application and the second application.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user at a first computer to first and second applications installed in a second computer. The second computer receives from the user a first request to access the first application, and in response, the second computer redirects the first request to a third computer, and in response, the third computer determines that the user was previously authenticated and so notifies the second computer, and in response, the second computer returns a first session key to the third computer. The first session key enables a session with the first application but not with the second application. The second computer receives from the user a second request with a second session key to access the first and/or second application, and in response the second computer determines that the user is authentic and notifying the first and/or second application that the user is authentic.
-
Citations
18 Claims
-
1. A method for authenticating a user at a first computer to first and second applications installed in a second computer, the method comprising:
-
said second computer receiving from the user a first request to access the first application, and in response, the second computer redirecting the first request to a third computer, and in response, the third computer determining that the user was previously authenticated and notifying the second computer that the user is authentic, and in response, the second computer returning a first session key to the third computer, said first session key enabling a session with the first application but not with the second application, said first, second, and third computers being three different computers, said first and second applications installed in the second computer being different applications; and said second computer receiving from the user a second request with a second session key to access the first application, the second application, or both the first application and the second application, and in response the second computer determining that the user is authentic and notifying the first application, the second application, or both the first application and the second application that the user is authentic so that the first application, the second application, or both the first application and the second application can send, to the first computer, a response to the second request, wherein the second session key was generated by the third computer, and sent by the third computer to the first computer, prior to the second computer having received the second request and in response to the third computer having received the first session key, and wherein the second session key enables a session with both the first application and the second application. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product, comprising one or more computer readable tangible storage devices and program instructions stored on the one or more storage devices, said program instructions configured to be executed by one or more processors to implement a method for authenticating a user at a first computer to first and second applications installed in a second computer, said method comprising:
-
said second computer receiving from the user a first request to access the first application, and in response, the second computer redirecting the first request to a third computer, and in response, the third computer determining that the user was previously authenticated and notifying the second computer that the user is authentic, and in response, the second computer returning a first session key to the third computer, said first session key enabling a session with the first application but not with the second application, said first, second, and third computers being three different computers, said first and second applications installed in the second computer being different applications; and said second computer receiving from the user a second request with a second session key to access the first application, the second application, or both the first application and the second application, and in response the second computer determining that the user is authentic and notifying the first application, the second application, or both the first application and the second application that the user is authentic so that the first application, the second application, or both the first application and the second application can send, to the first computer, a response to the second request, wherein the second session key was generated by the third computer, and sent by the third computer to the first computer, prior to the second computer having received the second request and in response to the third computer having received the first session key, and wherein the second session key enables a session with both the first application and the second application. - View Dependent Claims (8, 9, 10, 11, 12, 14, 15, 16, 17, 18)
-
-
13. A computer system comprising one or more processors, one or more computer readable memories, and one or more computer readable tangible storage devices, and program instructions stored on the one or more storage devices, said program instructions configured to be executed by the one or more processors via the one or more memories to implement a method for authenticating a user at a first computer to first and second applications installed in a second computer, said method comprising:
-
said second computer receiving from the user a first request to access the first application, and in response, the second computer redirecting the first request to a third computer, and in response, the third computer determining that the user was previously authenticated and notifying the second computer that the user is authentic, and in response, the second computer returning a first session key to the third computer, said first session key enabling a session with the first application but not with the second application, said first, second, and third computers being three different computers, said first and second applications installed in the second computer being different applications; and said second computer receiving from the user a second request with a second session key to access the first application, the second application, or both the first application and the second application, and in response the second computer determining that the user is authentic and notifying the first application, the second application, or both the first application and the second application that the user is authentic so that the first application, the second application, or both the first application and the second application can send, to the first computer, a response to the second request, wherein the second session key was generated by the third computer, and sent by the third computer to the first computer, prior to the second computer having received the second request and in response to the third computer having received the first session key, and wherein the second session key enables a session with both the first application and the second application.
-
Specification