×

SECURITY OBJECT CREATION, VALIDATION, AND ASSERTION FOR SINGLE SIGN ON AUTHENTICATION

  • US 20150244706A1
  • Filed: 02/25/2015
  • Published: 08/27/2015
  • Est. Priority Date: 02/26/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system for providing single-sign-on (SSO) credentials for a user on a mobile device to multiple network resources, the system comprising:

  • one or more hardware processors;

    a computer-readable memory; and

    an authentication system comprising executable instructions stored in the computer-readable memory, wherein the one or more processors are programmed to at least;

    receive, over a network, a request to access a first network resource by a mobile device associated with a user, wherein the first network resource is accessible by a plurality of users of an organization, wherein the plurality of users of the organization comprises the user, and wherein the request includes a security object associated with the mobile device;

    validate the security object as authentic by;

    determining, from the security object, a security object identifier;

    determining that the security object identifier is associated with the mobile device and the user in an identity database associated with the organization;

    when a determination is made that the security object identifier is associated with the mobile device and the user in the identity database, authenticate the user and the mobile device by;

    receiving a second authentication factor from the mobile device;

    validating the second authentication factor by comparing the second authentication factor with user data associated with the user, the user data accessed from the identity database;

    when a successful authentication of the mobile device and the user is made, determine an identity assertion format acceptable to the first network resource;

    create an identity assertion object related to the user in the determined identify assertion format, the identity assertion object being distinct from the security object and the object identifier; and

    provide, to the first network resource, the identity assertion object related to the user, wherein the identity assertion object is configured to allow the user to gain access to the first network resource.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×