×

AUTHENTICATION SERVER ENHANCEMENTS

  • US 20150113589A1
  • Filed: 09/29/2014
  • Published: 04/23/2015
  • Est. Priority Date: 10/01/2013
  • Status: Active Grant
First Claim
Patent Images

1. An authentication-server method comprising:

  • with at least one authentication server;

    implementing a set of authentication server configuration rules, wherein the authentication server configuration rules utilize regular-expression based commands;

    maintaining a running log of all commands entered by every user as each command is run by the at least one authentication server;

    running a configuration diff command each time a session ends;

    racking a set of actions of an authentication-server administrator on the authentication server;

    storing the set of actions of the authentication-server administrator in a log, wherein the log comprises a username of the authentication-server administrator who generated the log, and a time source and a time zone associated of a location of the set of actions;

    running a hash algorithm on the log;

    generating an portable document format (PDF) formatted file of the log;

    generating a list of all usernames from a set logs that failed a user-authentication process required to access the authentication server;

    when a specified amount of failed authentication attempts from a single remote internet protocol (IP) address are detected, blocking all authentication attempts from IP address for a specified period of time;

    adding an authorized IP address list as part of an access control list to a user record, wherein the access control list allows the user record'"'"'s username to access the authentication server from specified remote user hosts or subnets; and

    providing a mobile device application that enables the authentication-server administrator, wherein the mobile device application enables the authentication-server administrator to monitor and access a proxy server with access to the authentication server, and wherein the authentication server and the mobile device application authenticate to the proxy server over a secured connection.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×