Authentication method for networks
First Claim
1. An authentication method for use by application servers on networks to authenticate users of the applications, comprising:
- a requesting step wherein one of the application servers request one of the users to send authentication data to a verification server;
a sending step wherein the one of the users, in response to the request of the one of the application servers received during the requesting step, sends the authentication data of the one of the users together with identification data of the one of the users to the verification server;
a verification step wherein the verification server verifies whether the authentication data is a valid authentication data of the one of the users designated by the identification data;
a verification result reporting step wherein the verification server notifies the one of the application servers of a verification result; and
an authentication step wherein, based on the verification result returned in the verification result reporting step, the one of the application servers authenticates the one of the users.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for authenticating users on networks includes an application server requesting a user host to send authentication data to a verification server. The verification server maintains a database of valid authentication data, against which it compares and verifies the authentication data it receives from the user host. The verification result is sent to the application server, which authenticates the user based on the result. Therefore, the configuration of the application server is simplified. The verification server can be used by a plurality of application servers, allowing for the efficient use of resources on a network.
325 Citations
11 Claims
-
1. An authentication method for use by application servers on networks to authenticate users of the applications, comprising:
-
a requesting step wherein one of the application servers request one of the users to send authentication data to a verification server; a sending step wherein the one of the users, in response to the request of the one of the application servers received during the requesting step, sends the authentication data of the one of the users together with identification data of the one of the users to the verification server; a verification step wherein the verification server verifies whether the authentication data is a valid authentication data of the one of the users designated by the identification data; a verification result reporting step wherein the verification server notifies the one of the application servers of a verification result; and an authentication step wherein, based on the verification result returned in the verification result reporting step, the one of the application servers authenticates the one of the users. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11)
-
-
2. An authentication method for use by application servers on networks to authenticate users of the applications, comprising:
-
a requesting step wherein one of the application servers request one of the users to send authentication data to a verification server; a verification preparation request step wherein the one of the application servers sends an identification data of the one of the users to the verification server, requesting that a valid authentication data of the one of the users be read in advance from a database; a sending step wherein the one of the users, in response to the request of the one of the application servers received during the requesting step, sends the authentication data of the one of the users together with identification data of the one of the users to the verification server; a verification step wherein the verification server verifies whether the sent authentication data is a valid authentication data of the one of the users designated by the identification data; a verification result reporting step in which the verification server notifies the one of the application servers of a verification result; and an authentication step wherein, based on the verification result returned in the verification result reporting step, the one of the application servers authenticates the one of the users.
-
-
3. An authentication method for use by application servers on networks to authenticate users of the applications, comprising:
-
a requesting step wherein one of the application servers request one of the users to send authentication data to one of a plurality of verification servers; a sending step wherein the one of the users, in response to the request of the one of the application servers received during the requesting step, sends the authentication data of the one of the users together with identification data of the one of the users to the one of the verification servers; a verification step wherein the one of the verification servers verifies whether the authentication data is a valid authentication data of the one of the users designated by the identification data; a verification result reporting step wherein the one of the verification servers notifies the one of the application servers of a verification result; and an authentication step wherein, based on the verification result returned in the verification result reporting step, the one of the application servers authenticates the one of the users. - View Dependent Claims (4)
-
Specification