Method and system for transmitting authentication context information
First Claim
1. A system for facilitating an authentication of a user comprising:
- a first computer system configured to verify an identity of said user, and configured to transmit to a second computer system authentication information, wherein said authentication information comprises characteristics regarding a process used to initially associate user credentials to said user, and physical controls of a facility housing said first computer; and
said second computer system configured to provide services to said user based upon whether said authentication information received from said first computer system substantially complies with a predetermined class established by said second computer system, wherein said second computer system communicates with said first computer system.
3 Assignments
0 Petitions
Accused Products
Abstract
A system of the present invention uses an identity provider to provide the authentication services for multiple service providers. An identity provider communicates with one or more service providers. A user that wishes to gain access to a service provider is authenticated though the use of the identity provider. A user desiring to access a service provider is first authenticated by the identity provider. The identity provider determines if the user meets the desired class level and provides various information related to the authentication. When the user attempts to access a second service provider that is associated with the same identity provider, the second service provider accesses the identity provider and determines that the user was recently authenticated. The identity provider then transmits the relevant information regarding the authentication process to the second service provider, which can then allow or deny the user access to the second service provider.
-
Citations
18 Claims
-
1. A system for facilitating an authentication of a user comprising:
-
a first computer system configured to verify an identity of said user, and configured to transmit to a second computer system authentication information, wherein said authentication information comprises characteristics regarding a process used to initially associate user credentials to said user, and physical controls of a facility housing said first computer; and said second computer system configured to provide services to said user based upon whether said authentication information received from said first computer system substantially complies with a predetermined class established by said second computer system, wherein said second computer system communicates with said first computer system. - View Dependent Claims (2, 3, 4, 5, 12, 13, 14)
-
-
6. A method for facilitating authentication of a user comprising:
-
receiving, at a first computer system, information indicative of an identity of said user; verifying, by said first computer system, said identity of said user; and transmitting, by said first computer system, authentication information from said first computer system to a second computer system, wherein said authentication information includes characteristics regarding a process used to initially associate user credentials to said user, and physical controls of a facility housing said first computer, and wherein said second computer system allows access to said second computer system provided that said authentication information substantially complies with said predetermined class established by said second computer system. - View Dependent Claims (7, 8, 9, 10, 11, 15, 16, 17)
-
-
18. A method for facilitating authentication of a user comprising:
-
receiving, by a second computer system and from a first computer system, authentication information, wherein said authentication information includes characteristics regarding a process used to initially associate user credentials to said user, and physical controls of a facility housing said first computer, wherein said first computer system receives information indicative of an identity of said user and verifies said identity of said user; and allowing, by said second computer system, access to said second computer system provided that said authentication information substantially complies with said predetermined class established by said second computer system.
-
Specification