STRONG AUTHENTICATION WITH FEEDER ROBOT IN A FEDERATED IDENTITY WEB ENVIRONMENT
First Claim
1. An authentication server in communication with a controlled access application that requires at least a first Identifier (ID) factor and a second ID factor for authentication, the authentication server comprising:
- at least one processor; and
memory storing instructions that, when executed by the at least one processor, causes the authentication server to perform operations includingreceiving a request to authenticate a user using the first ID factor and the second ID factor,obtaining first information to complete the first ID factor, at least some of the first information being obtained from a user attempting to access the controlled access application,generating, at the authentication server, a first web form using the first information,submitting the first web form to a host verification server,receiving an indication of successful verification from the host verification server,obtaining second information to complete the second ID factor, at least some of the second information being obtained from the user,generating, at the authentication server, a second web form using the second information obtained,submitting the second web form to the host verification server,receiving an indication of successful verification from the host verification server, andinitiating, in response to receiving the indication of successful verification, access to the controlled access application.
1 Assignment
0 Petitions
Accused Products
Abstract
Method, system, and programs for performing two-factor authentication for a controlled access application via one or more third-party host verification servers. An example method includes receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor, obtaining first information to complete the second ID factor, at least some of the first information being obtained from the user, and generating a first web form using the first information. The method also includes submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application.
16 Citations
20 Claims
-
1. An authentication server in communication with a controlled access application that requires at least a first Identifier (ID) factor and a second ID factor for authentication, the authentication server comprising:
-
at least one processor; and memory storing instructions that, when executed by the at least one processor, causes the authentication server to perform operations including receiving a request to authenticate a user using the first ID factor and the second ID factor, obtaining first information to complete the first ID factor, at least some of the first information being obtained from a user attempting to access the controlled access application, generating, at the authentication server, a first web form using the first information, submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server, obtaining second information to complete the second ID factor, at least some of the second information being obtained from the user, generating, at the authentication server, a second web form using the second information obtained, submitting the second web form to the host verification server, receiving an indication of successful verification from the host verification server, and initiating, in response to receiving the indication of successful verification, access to the controlled access application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
receiving a request to a controlled access application after a user has successfully logged into an enterprise system with a first Identifier (ID) factor, the controlled access application requiring additional authentication with a second ID factor; obtaining first information to complete the second ID factor, at least some of the first information being obtained from the user, generating a first web form using the first information, submitting the first web form to a host verification server, receiving an indication of successful verification from the host verification server; and initiating, in response to receiving the indication of successful verification, access to the controlled access application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
receiving a request to access a controlled access application, the request including a first Identifier (ID) factor and a second ID factor and identifying a user; selecting a first feeder robot configured to obtain first information for the first ID factor; activating the first feeder robot to generate a first web form using the first information, at least some of the first information being information obtained from the user; submitting the first web form to a first host verification server, receiving an indication of successful verification from the first host verification server; selecting a second feeder robot configured to obtain second information for the second ID factor; activating the second feeder robot to generate a second web form using the second information, at least some of the second information being information obtained from the user; submitting the second web form to a second host verification server; and initiating, in response to receiving an indication of successful verification from the second host verification server, access to the controlled access application. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification