×

Methods and arrangements for controlling access to resources based on authentication method

  • US 7,305,701 B2
  • Filed: 04/30/2001
  • Issued: 12/04/2007
  • Est. Priority Date: 04/30/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for use in a computer capable of supporting multiple authentication mechanisms, the method comprising:

  • generating at least one access token that identifies a user, and is associated with and identifies at least one authentication mechanism that has been used to authenticate the user, wherein generating the access token further includes identifying within the access token at least one characteristic associated with the authentication mechanism, wherein the at least one characteristic associated with the authentication mechanism includes a measure of strength of the authentication mechanism, wherein the measure of strength of the authentication mechanism depends on the length of key employed in an encryption process; and

    controlling the user'"'"'s access to at least one resource based on the access token.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×