Method for authenticating a user access request
First Claim
1. A method for authenticating a user access request comprising:
- receiving an access request by a firewall device from a user over a first communication medium, said access request indicating said user is requesting access to a protected device coupled to said first communication medium;
prompting the user for a username over the first communication medium;
sending a password to said user over a communication medium other than said first communication medium responsive to receiving at least a valid user name from said user;
verifying the access request responsive to receiving said password from said user through said first communication medium; and
providing, by said firewall device, access to said protected element to said user over said first communication medium responsive to a successful verification of said access request.
0 Assignments
0 Petitions
Accused Products
Abstract
A firewall for authenticating a user access request is disclosed. The firewall device may include a proxy process for processing incoming connection requests. The proxy is configured to receive an access request from a user over a first communication medium and prompt the user for a username over the first communication medium. The firewall may then send a password to the user over a communication medium other than said first communication medium responsive to receiving a valid username from the user. The firewall may then verify the access request responsive to receiving the password from the user through the first communication medium. The firewall may send passwords to a mobile device for verification.
296 Citations
10 Claims
-
1. A method for authenticating a user access request comprising:
-
receiving an access request by a firewall device from a user over a first communication medium, said access request indicating said user is requesting access to a protected device coupled to said first communication medium; prompting the user for a username over the first communication medium; sending a password to said user over a communication medium other than said first communication medium responsive to receiving at least a valid user name from said user; verifying the access request responsive to receiving said password from said user through said first communication medium; and providing, by said firewall device, access to said protected element to said user over said first communication medium responsive to a successful verification of said access request. - View Dependent Claims (2, 3, 4)
-
-
5. An apparatus for authenticating a user access request comprising:
-
means for receiving by a firewall device an access request from a user over a first communication medium, said access request indicating said user is requesting access to a protected device coupled to said first communication medium; means for prompting said user a username over the first communication medium; means for sending a password to said user over a communication medium other than said first communication medium responsive to receiving at least a valid user name from said user; means for verifying the access request responsive to receiving said password from said user through said first communication medium; and means for providing access to said protected element to said user over said first communication medium responsive to a successful verification of said access request. - View Dependent Claims (6, 7, 8)
-
-
9. A firewall for authenticating a user access request comprising:
-
a firewall device including at least one proxy process for processing incoming connection requests; the at least one proxy configured to; receive an access request from a user over a first communication medium, said access request indicating said user is requesting access to a protected device coupled to said first communication medium; prompt said user for a username over the first communication medium; send a password to the user over a communication medium other than said first communication medium responsive to receiving a valid username from said user; verify the access request responsive to receiving said password from said user through said first communication medium; and provide access to said protected element to said user over said first communication medium responsive to a successful verification of said access request. - View Dependent Claims (10)
-
Specification