System and method for authentication to an application
First Claim
1. A method for authenticating a first user in a protected network to an application shared concurrently with a second user in an unprotected network, said method comprising the steps of:
- the first user supplying a userID and a password to a first server within said protected network for authentication for said application, said application residing in a third network configured as a buffer between said protected network and said unprotected network;
said first server determining that said userID and password are authentic, and in response, said first server forwarding to said application an authentication key for said first user and a selection by said first user pertaining to said application, said password not being sent from said protected network into said third network to access said application;
said application determining that said key is authentic, and in response, said application complying with said selection by said first user; and
said second user supplying another userID and another password to said application, said application determining that said other userID and said other password are authentic, and in response, said application complying with a selection made by said second user pertaining to said application.
1 Assignment
0 Petitions
Accused Products
Abstract
Authenticating a first user in a protected network to an application in a DMZ network shared simultaneously with a second user in an unprotected network. The first user supplies a userID and a password to a first server within the protected network for authentication for the application. The first sewer checks authentication of the first user based on the userID and password. If the first user is authentic, the first server forwards to the application an authentication key for the first user and a selection by the first user pertaining to the application. The application checks authentication of the key, and if authentic, complies with the selection by the first user. The second user supplies another userID and another password to the application. If the other userID and other password are authentic, the application complies with a selection made by the second user pertaining to the application.
-
Citations
22 Claims
-
1. A method for authenticating a first user in a protected network to an application shared concurrently with a second user in an unprotected network, said method comprising the steps of:
-
the first user supplying a userID and a password to a first server within said protected network for authentication for said application, said application residing in a third network configured as a buffer between said protected network and said unprotected network; said first server determining that said userID and password are authentic, and in response, said first server forwarding to said application an authentication key for said first user and a selection by said first user pertaining to said application, said password not being sent from said protected network into said third network to access said application; said application determining that said key is authentic, and in response, said application complying with said selection by said first user; and said second user supplying another userID and another password to said application, said application determining that said other userID and said other password are authentic, and in response, said application complying with a selection made by said second user pertaining to said application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An authentication system comprising:
-
an application on a first server in a first network; a second server in a second, protected network to receive from a first user within said second network a userID and a password for authentication for said application, said second server including means for checking authentication of said first user based on said userID and password, and if said first user is authentic, forwarding to said application an authentication key for said first user and a selection by said first user pertaining to said application, said password not being sent from said protected network into said first network to access said application; and said application including means for checking authentication of said key, and if authentic, complying with said selection by said first user; and a workstation in a third, unprotected network for a second user, said application being shared concurrently with said first and second users, said first network configured as a buffer between said second, protected network and said third, unprotected network; and
whereinsaid application receives from said second user another userID and another password, and includes means for determining that said other userID and other password are authentic, and in response, complying with a selection made by said second user pertaining to said application. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer program product for authenticating a first user in a protected network to an application shared simultaneously with a second user in an unprotected network, and authenticating said second user to said application, said program product comprising:
-
a computer readable medium; first program instructions, for execution on a first server within said protected network, to receive from the first user a userID and a password for authentication for said application, said application residing in a third network configured as a security buffer between said protected network and said unprotected network; second program instructions, for execution on said first server, to check authentication of said first user based on said userID and password, and if said first user is authentic, to forward to said application an authentication key for said first user and a selection by said first user pertaining to said application, said password not being sent from said protected network into said third network to access said application; third program instructions in said application to check authentication of said key, and if authentic, comply with said selection by said first user; fourth program instructions in said application to receive from said second user another userID and another password, determine if said other userID and other password are authentic, and if so, instruct said application to comply with a selection made by said second user pertaining to said application; and
whereinsaid first, second, third and fourth program instructions are recorded on said medium in functional form. - View Dependent Claims (18)
-
-
19. A method for authenticating a first user of a first computer in a protected network to a second computer executing an application, a second user of a third computer in an unprotected network and said first user of said first computer concurrently sharing said application, said second computer residing in a third network configured as a buffer between said protected network and said unprotected network;
- said method comprising the steps of;
the first computer supplying a userID and a password of the first user to a fourth computer in said protected network for authentication for said application; said fourth computer determining that said userID and password are authentic, and in response, forwarding to said second computer an authentication key for said first user, said password not being sent from said protected network into said third network to access said application; said second computer determining that said key is authentic, and in response, complying with a selection by said first user pertaining to said application; and said third computer supplying another userID and another password of said second user to said second computer, said second computer determining that said other userID and said other password are authentic, and in response, said application complying with a selection made by said second user pertaining to said application. - View Dependent Claims (20, 21, 22)
- said method comprising the steps of;
Specification