Method, software program, and system for managing access to information and the transfer thereof
First Claim
1. A method for granting an access to information, comprising:
- a) electronically establishing, by at least one intermediary server, through a first authentication procedure at least one first client login authentication data which allows at least one client processor to access the at least one intermediary server;
b) electronically receiving, by the at least one intermediary server, at least one second client login authentication data from at least one host server,i) wherein the at least one second client login authentication data is established by the at least one host server using a second authentication procedure,ii) wherein the at least one second client login authentication data allows the at least one client processor to access the at least one host server,iii) wherein the first authentication procedure is separate from the second authentication procedure, andiv) wherein the at least one intermediary server is independently managed from the at least one host server;
c) electronically storing, by the at least one intermediary server, at least one second client login authentication data, in one or more data structures;
d) electronically granting, by the at least one intermediary server, an access to a content of the at least one intermediary server to the at least one client processor when the at least one intermediary server receives the at least one first client login authentication data from the at least one client processor;
e) electronically receiving, by the at least one intermediary server, a request to access the at least one host server from the at least one client processor; and
f) electronically providing, by the at least one intermediary server, the at least one second client login authentication data to the at least one host server after the at least one client processor has connected to the at least one intermediary server, wherein the at least one client processor avoids a need to use the second authentication procedure to access the at least one host server.
16 Assignments
0 Petitions
Accused Products
Abstract
A method for granting an access to information includes electronically establishing, by at least one intermediary server, through a first authentication procedure at least one first client login authentication data which allows at least one client processor to access the at least one intermediary server, electronically receiving, by the at least one intermediary server, at least one second client login authentication data from at least one host server, wherein the at least one second client login authentication data is established by the at least one host server using a second authentication procedure, wherein the at least one second client login authentication data allows the at least one client processor to access the at least one host server, wherein the first authentication procedure is separate from the second authentication procedure, and wherein the at least one intermediary server is independently managed from the at least one host server.
27 Citations
14 Claims
-
1. A method for granting an access to information, comprising:
-
a) electronically establishing, by at least one intermediary server, through a first authentication procedure at least one first client login authentication data which allows at least one client processor to access the at least one intermediary server; b) electronically receiving, by the at least one intermediary server, at least one second client login authentication data from at least one host server, i) wherein the at least one second client login authentication data is established by the at least one host server using a second authentication procedure, ii) wherein the at least one second client login authentication data allows the at least one client processor to access the at least one host server, iii) wherein the first authentication procedure is separate from the second authentication procedure, and iv) wherein the at least one intermediary server is independently managed from the at least one host server; c) electronically storing, by the at least one intermediary server, at least one second client login authentication data, in one or more data structures; d) electronically granting, by the at least one intermediary server, an access to a content of the at least one intermediary server to the at least one client processor when the at least one intermediary server receives the at least one first client login authentication data from the at least one client processor; e) electronically receiving, by the at least one intermediary server, a request to access the at least one host server from the at least one client processor; and f) electronically providing, by the at least one intermediary server, the at least one second client login authentication data to the at least one host server after the at least one client processor has connected to the at least one intermediary server, wherein the at least one client processor avoids a need to use the second authentication procedure to access the at least one host server. - View Dependent Claims (2, 3, 4, 5, 6, 13)
-
-
7. A computer system for granting an access to information, the computer system comprising:
-
memory having at least one region for storing computer executable program code; and an intermediary server processor for executing the program code stored in the memory, wherein the program code comprises; a) code to establish, by at least one intermediary server, through a first authentication procedure at least one first client login authentication data which allows at least one client processor to access the at least one intermediary server; b) code to receive, by the at least one intermediary server, at least one second client login authentication data from at least one host server, i) wherein the at least one second client login authentication data is established by the at least one host server using a second authentication procedure, ii) wherein the at least one second client login authentication data allows the at least one client processor to access the at least one host server, iii) wherein the first authentication procedure is separate from the second authentication procedure, and iv) wherein the at least one intermediary server is independently managed from the at least one host server; c) code to store, by the at least one intermediary server, at least one second client login authentication data, in one or more data structures; d) code to grant, by the at least one intermediary server, an access to a content of the at least one intermediary server to the at least one client processor when the at least one intermediary server receives the at least one first client login authentication data from the at least one client processor; e) code to receive, by the at least one intermediary server, a request to access the at least one host server from the at least one client processor; and f) code to provide, by the at least one intermediary server, the at least one second client login authentication data to the at least one host server after the at least one client processor has connected to the at least one intermediary server, wherein the at least one client processor avoids a need to use the second authentication procedure to access the at least one host server. - View Dependent Claims (8, 9, 10, 11, 12, 14)
-
Specification