DYNAMIC AUTHENTICATION FOR A COMPUTING SYSTEM
First Claim
1. A method comprising:
- receiving, by one or more processors, a login request from a client and, in response, issuing, by one or more processors, a token request to the client, wherein the token request identifies a plurality of token positions within a first ordered set of tokens generated by the client using a first seed and a first algorithm;
receiving, by one or more processors, one or more a plurality of client tokens generated by the client based on the plurality of token positions within the first ordered set of tokens;
generating, by one or more processors, a second ordered set of tokens based on the first seed and the first algorithm; and
authenticating, by one or more processors, the login request by comparing the plurality of client tokens with the second ordered set of tokens, based, at least in part, on the plurality of token positions.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, computer program product, and computer system for authenticating user access to a computing system using dynamic tokens are provided. A login request from a client is received, and in response, a token request from the client is issued. The token request identifies one or more sequence positions. One or more client tokens generated by the client are received based on the one or more sequence positions of the tokens. A sequence of tokens based on a first seed and a first algorithm are generated. The login request is authenticated by comparing the one or more client tokens with the sequence of tokens, based at least in part, on the one or more sequence positions.
-
Citations
21 Claims
-
1. A method comprising:
-
receiving, by one or more processors, a login request from a client and, in response, issuing, by one or more processors, a token request to the client, wherein the token request identifies a plurality of token positions within a first ordered set of tokens generated by the client using a first seed and a first algorithm; receiving, by one or more processors, one or more a plurality of client tokens generated by the client based on the plurality of token positions within the first ordered set of tokens; generating, by one or more processors, a second ordered set of tokens based on the first seed and the first algorithm; and authenticating, by one or more processors, the login request by comparing the plurality of client tokens with the second ordered set of tokens, based, at least in part, on the plurality of token positions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 21)
-
-
9. A computer program product, the computer program product comprising:
-
a computer readable storage device and program instructions stored on the computer readable storage device, the program instructions comprising; program instructions to receive a login request from a client and, in response, issue a token request to the client, wherein the token request identifies a plurality of token positions within a first ordered set of tokens generated by the client using a first seed and a first algorithm; program instructions to receive a plurality of client tokens generated by the client based on the plurality of token positions within the first ordered set of tokens; program instructions to generate a second ordered set of tokens based on the first seed and the first algorithm; and program instructions to authenticate the login request by comparing the plurality of client tokens with the second ordered set of tokens, based, at least in part, on the one or more plurality of token positions. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A computer system, the computer system comprising:
-
one or more computer processors; one or more computer readable storage media; program instructions stored on the computer readable storage media for execution by at least one of the one or more processors, the program instructions comprising; program instructions to receive a login request from a client and, in response, issue a token request to the client, wherein the token request identifies a plurality of token positions within a first ordered set of tokens generated by the client using a first seed and a first algorithm; program instructions to receive a plurality of client tokens generated by the client based on the plurality of token positions within the first ordered set of tokens; program instructions to generate a second ordered set of tokens based on the first seed and the first algorithm; and program instructions to authenticate the login request by comparing the plurality of client tokens with the second ordered set of tokens, based, at least in part, on the one or more plurality of token positions. - View Dependent Claims (16, 17, 18, 19)
-
-
20. (canceled)
Specification