×

Method and software for migrating protected authentication data

  • US 8,027,921 B1
  • Filed: 02/13/2002
  • Issued: 09/27/2011
  • Est. Priority Date: 02/13/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method for populating password data to a target datastore associated with a target user authenticator that is in communication with a source user authenticator after migration from the source user authenticator, the source user authenticator having associated with a source datastore comprising unencrypted user identification data and user authentication data encrypted with a proprietary encryption algorithm, while also responding to user requests for information, the method comprising:

  • migrating unencrypted data from the source datastore to the target datastore;

    intercepting, by a servlet interceptor, a request from a user to access information protected by the target user authenticator;

    prompting, by the servlet interceptor, the user for an identification;

    receiving, by the servlet interceptor, the identification from the user;

    locating, by the servlet interceptor, a corresponding identification in the target datastore;

    searching, by the servlet interceptor, the target datastore for a user authentication data associated with the corresponding identification;

    determining, by the servlet interceptor, that the target datastore does not include a user authentication data associated with the corresponding identification;

    forwarding the intercepted request to the source user authenticator responsive to the determining;

    prompting, by the source user authenticator, the user for identification and user authentication data;

    receiving, by the source user authenticator, identification and user authentication data from the user;

    monitoring, by a password capture process, the source user authenticator for an approval response;

    detecting, by the password capture process, the approval response from the source user authenticator;

    capturing, by the password capture process, the user authentication data provided to the source user authenticator by the user;

    populating, by the password capture process, the target datastore with the captured user authentication data associated with the corresponding identification upon detecting the approval response.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×