×

Systems and methods for providing security token authentication

  • US 8,032,932 B2
  • Filed: 08/22/2008
  • Issued: 10/04/2011
  • Est. Priority Date: 08/22/2008
  • Status: Active Grant
First Claim
Patent Images

1. A system for authenticating a security token provided to request access to at least one business application in an enterprise including a plurality of business units, comprising:

  • a processor coupled to memory and programmed for;

    receiving a request for the security token for authenticating the request to access the at least one business application of a plurality of business applications, each business application being managed by a different one of the plurality of business units, and the plurality of business units being provided with access to a token domain interface (TAMIN);

    creating, via accessing the TAMIN, a unique user identification (UID) for the security-token request;

    assigning and activating, via accessing the TAMIN, the security token in response to the security-token request, the security token being identified by a unique token identification;

    storing in a lookup database a mapping of security tokens to token types and a plurality of token domains, each of said token domains operating to authenticate a type of security token;

    storing in a user store database a user profile that includes the UID, the assigned and activated security token, a token type of the assigned and activated security token as provided by the mapping in the lookup database, and a corresponding one of the token domains as also provided by the mapping in the lookup database;

    receiving by an authentication broker the assigned and activated security token from the at least one business application;

    looking up, via accessing the TAMIN, the assigned and activated security token and its unique token identification in the user profile stored in the user store database to identify the token type and the corresponding token domain of the assigned and activated security token so as to authenticate the assigned and activated security token; and

    preventing one of the plurality of business units to perform, via accessing the TAMIN, the steps of creating the UID, assigning the security token, and looking up the assigned and activated security token upon a determination that the assigned security token is used for authentication access to multiple business applications in different ones of the plurality of business units.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×