×

Methods and systems for selecting methodology for authenticating computer systems on a per computer system or per user basis

  • US 7,444,368 B1
  • Filed: 08/31/2000
  • Issued: 10/28/2008
  • Est. Priority Date: 02/29/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method in a server computer system of authenticating client computer systems using various authentication mechanisms, the method comprising:

  • receiving from a controlling client computer system a first instruction identifying a first client computer system, identifying a first information related to the controlling client computer system available to the first client computer system through a service of the server computer system, and identifying at least one first authentication mechanism that can be used to authenticate the first client computer system, the first authentication mechanism specifying at least one first type of information necessary to verify a first purported identity of the first client computer system, the first client computer system having client-specific knowledge of the information necessary to verify the first purported identity of the first client computer system, the first client computer system being separate from the controlling client computer system;

    receiving from the controlling client computer system a second instruction identifying a second client computer system, identifying a second information related to the controlling client computer system available to the second client computer system through the service of the server computer system, identifying a second authentication mechanism that can be used to authenticate the second client computer system, and identifying a third authentication mechanism that can be used to authenticate the second client computer system, the second authentication mechanism specifying a second type of information necessary to verify a second purported identity of the second client computer system, the second client computer system having client-specific knowledge of the information necessary to verify the second purported identity of the second client computer system, the third authentication mechanism specifying a third type of information necessary to verify a third purported identity of the second client computer system, the second client computer system having client-specific knowledge of the information necessary to verify the third purported identity of the second client computer system, the second client computer system being separate from the controlling client computer system;

    storing, for the first client computer system, an indication of the first authentication mechanism;

    storing, for the second client computer system, an indication of the second authentication mechanism and the third authentication mechanism;

    after receiving the first instruction and before authenticating the first client computer system, receiving a first request from the first client computer system to access the service of the server computer system, the first request including information of the type specified by the first authentication mechanism that is necessary to verify the first purported identity of the first client computer system, wherein the information is known specifically to the first client computer system;

    initially authenticating the first client computer system using the first authentication mechanism based on the information received from the first client computer system that is necessary to verify the first purported identity of the first client computer system;

    after receiving the second instruction and before authenticating the second client computer system, receiving a second request from the second client computer system to access the service of the server computer system;

    upon receiving the second request from the second client computer system to access the service of the server computer system, selecting a selected authentication mechanism from the second and third authentication mechanisms, the selected authentication mechanism being different from the first authentication mechanism; and

    authenticating the second client computer system using the selected authentication mechanism based on information received from the second client computer system that is necessary to verify the second or third purported identity of the second client computer system corresponding to the selected authentication mechanism.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×