APPLICATION AUTHENTICATION CHECKING SYSTEM
First Claim
1. A method for authentication checking comprising:
- receiving an authentication verification request for accessing an application, the authentication verification request including a user identification, a device identification and an application identification;
determining a validity of the authentication verification request, based on at least a last known authentication information, and a first subset of an application policy rule-set specific to the user identification and the device identification, if the application policy rule-set permits cross-application authentication;
determining the validity of the authentication verification request, based on at least the last known authentication information, and a second subset of the application policy rule-set specific to the user identification, the device identification and the application identification, if the application policy rule-set does not permit cross-application authentication;
enabling access to the application if the validity of the authentication verification request is true; and
requesting a new authentication if the validity of the authentication verification request is false.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for authentication checking comprises receiving an authentication verification request for accessing an application. The authentication verification request includes a user identification, a device identification and an application identification. A validity of the authentication verification request is determined based on at least a last known authentication information, and a first subset of an application policy rule-set specific to the user identification and the device identification, if the application policy rule-set permits cross-application authentication; otherwise the validity is determined based on at least a second subset of the application policy rule-set specific to the user identification, the device identification and the application identification. Access to the application is enabled if the validity of the authentication verification request is true; otherwise a new authentication is requested.
20 Citations
20 Claims
-
1. A method for authentication checking comprising:
-
receiving an authentication verification request for accessing an application, the authentication verification request including a user identification, a device identification and an application identification; determining a validity of the authentication verification request, based on at least a last known authentication information, and a first subset of an application policy rule-set specific to the user identification and the device identification, if the application policy rule-set permits cross-application authentication; determining the validity of the authentication verification request, based on at least the last known authentication information, and a second subset of the application policy rule-set specific to the user identification, the device identification and the application identification, if the application policy rule-set does not permit cross-application authentication; enabling access to the application if the validity of the authentication verification request is true; and requesting a new authentication if the validity of the authentication verification request is false. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for accessing an application on a device comprising:
-
initiating an authentication verification request for accessing an application, the authentication verification request including a user identification, a device identification and an application identification; accessing the application if the user identification and the device identification are valid, a user authentication is valid and if cross-application authentication is allowed; and accessing the application if the user identification and the device identification are valid for the application identified by the application identification, the user authentication is valid and if cross-application authentication is not allowed.
-
-
20. A computer program product for authentication checking, the computer program product comprising:
-
a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising; computer readable program code configured to receive an authentication verification request for accessing an application, the authentication verification request including a user identification, a device identification and an application identification; computer readable program code configured to determine a validity of the authentication verification request, based on at least a last known authentication information, and a first subset of an application policy rule-set specific to the user identification and the device identification, if the application policy rule-set permits cross-application authentication; computer readable program code configured to determine the validity of the authentication verification request, based on at least the last known authentication information, and a second subset of the application policy rule-set specific to the user identification, the device identification and the application identification, if the application policy rule-set does not permit cross-application authentication; computer readable program code configured to enable access to the application if the validity of the authentication verification request is true; and computer readable program code configured to request a new authentication if the validity of the authentication verification request is false.
-
Specification