×

Method, software program, and system for managing access to information and the transfer thereof

  • US 7,814,537 B2
  • Filed: 01/19/2007
  • Issued: 10/12/2010
  • Est. Priority Date: 12/29/2000
  • Status: Active Grant
First Claim
Patent Images

1. A method for granting an access to information, comprising:

  • a) electronically establishing, by at least one intermediary server, through a first authentication procedure at least one first client login authentication data which allows at least one client processor to access the at least one intermediary server;

    b) electronically receiving, by the at least one intermediary server, at least one second client login authentication data from at least one host server,i) wherein the at least one second client login authentication data is established by the at least one host server using a second authentication procedure,ii) wherein the at least one second client login authentication data allows the at least one client processor to access the at least one host server,iii) wherein the first authentication procedure is separate from the second authentication procedure, andiv) wherein the at least one intermediary server is independently managed from the at least one host server;

    c) electronically storing, by the at least one intermediary server, at least one second client login authentication data, in one or more data structures;

    d) electronically granting, by the at least one intermediary server, an access to a content of the at least one intermediary server to the at least one client processor when the at least one intermediary server receives the at least one first client login authentication data from the at least one client processor;

    e) electronically receiving, by the at least one intermediary server, a request to access the at least one host server from the at least one client processor; and

    f) electronically providing, by the at least one intermediary server, the at least one second client login authentication data to the at least one host server after the at least one client processor has connected to the at least one intermediary server, wherein the at least one client processor avoids a need to use the second authentication procedure to access the at least one host server.

View all claims
  • 16 Assignments
Timeline View
Assignment View
    ×
    ×