Isolating multiple authentication channels, each using multiple authentication models
First Claim
Patent Images
1. An application server embodied in a computer, comprising:
- a user list, including a user name and a cleartext password associated with the user name;
an authenticator to authenticate the cleartext password using an authentication server;
a hasher to hash the cleartext password to produce a hashed password;
a comparator to compare the hashed password with a received hashed password; and
a client services provider to receive the received hashed password from a workstation and to transmit a result from the comparator to the workstation.
11 Assignments
0 Petitions
Accused Products
Abstract
A computer receives a user authentication request from a client. The computer accesses a password associated with the user name, stored locally on the computer, and attempts to authenticate the password using an authentication server. If the password authentication succeeds, the computer hashes the password and compares the hashes. If the hashes match, the user authentication succeeds.
-
Citations
31 Claims
-
1. An application server embodied in a computer, comprising:
-
a user list, including a user name and a cleartext password associated with the user name; an authenticator to authenticate the cleartext password using an authentication server; a hasher to hash the cleartext password to produce a hashed password; a comparator to compare the hashed password with a received hashed password; and a client services provider to receive the received hashed password from a workstation and to transmit a result from the comparator to the workstation. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising:
-
a network; a workstation coupled to the network, the workstation including; a first user name and a first cleartext password; and a first hasher to hash the first cleartext password to produce a first hashed password; an authentication server coupled to the network, the authentication server including a second user name and a second cleartext password associated with the second user name; and an application server coupled to the network, the application server including; a user list including a third user name and a third cleartext password associated with the third user name; an authenticator to authenticate the third cleartext password to the second cleartext password using the authentication server; a second hasher to hash the third cleartext password to produce a second hashed password; a comparator to compare the first hashed password with the second hashed password; and a client services provider to receive the received hashed password from a workstation and to transmit a result from the comparator to the workstation. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method for authenticating a user on an application server, comprising:
-
receiving a user name and a hashed password from a first workstation; determining a cleartext password associated with the user name; authenticating the cleartext password to a second password using an authentication server; determining a hashing algorithm used by the first workstation; hashing the cleartext password using the hashing algorithm to produce a computed hashed password; comparing the received hashed password with the computed hashed password; and if the received hashed password matches the computed hashed password, authenticating the user. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. An article comprising a machine-accessible medium having associated data, wherein the data, when accessed, results in a machine performing:
-
receiving a user name and a hashed password from a first workstation; determining a cleartext password associated with the user name; authenticating the cleartext password to a second password using an authentication server; determining a hashing algorithm used by the first workstation; hashing the cleartext password using the hashing algorithm to produce a computed hashed password; comparing the received hashed password with the computed hashed password; and if the received hashed password matches the computed hashed password, authenticating the user. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification