×

Method and system for single signon for multiple remote sites of a computer network

  • US 7,774,612 B1
  • Filed: 05/11/2007
  • Issued: 08/10/2010
  • Est. Priority Date: 10/03/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for implementing a single sign-on service for a computer network having a plurality of network servers including a first network server and a second network server, wherein each of the first and second network servers requires authentication of a remote user computer requesting access to the server, the system comprising:

  • one or more computer processors;

    a database operative with at least one of the computer processors to store authentication information for authorized users of the first network server, the authentication information including usernames for the first network server and usernames for the second network server;

    a mapping component operative with at least one of the computer processors to map the usernames for the first network server to the usernames for the second network server;

    a linking component operative with at least one of the computer processors to generate an outgoing link request from the first network server, the outgoing link request including;

    information for locating a resource of the second network server;

    a first username received from the remote user computer and included in the authorized usernames;

    a second username mapped from the first username by the mapping component; and

    an encrypted component formed by encrypting information including the first username, the second username and a secret known to the first network server and the second network server; and

    one or more authenticating components, operative with at least one of the computer processors, for;

    generating an encryption result including encrypting information including the first username and the second username of the received link request using the encryption process and the secret;

    comparing the encryption result with the encrypted component of the received link request; and

    logging the remote user in to the second network based on the result of comparing the encryption result with the encrypted component of the link request.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×