Method and system for transmitting authentication context information
First Claim
1. A class-based authentication system, comprising:
- a network interface communicating with a memory;
said memory communicating with a class-based authentication processor; and
said class-based authentication processor, when executing a computer program, performs operations comprising;
receiving, by said class-based authentication processor and from an authentication information system, authentication information comprising physical controls of a facility housing said authentication information system, wherein said authentication information system creates said authentication information in response to said authentication information system authenticating a user;
determining, by said class-based authentication processor, that said authentication information substantially complies with a predetermined class established by said class-based authentication processor; and
providing services, by said class-based authentication processor to said user, based upon said determining.
3 Assignments
0 Petitions
Accused Products
Abstract
A system of the present invention uses an identity provider to provide the authentication services for multiple service providers. An identity provider communicates with one or more service providers. A user that wishes to gain access to a service provider is authenticated through the use of the identity provider. A user desiring to access a service provider is first authenticated by the identity provider. The identity provider determines if the user meets the desired class level and provides various information related to the authentication. When the user attempts to access a second service provider that is associated with the same identity provider, the second service provider accesses the identity provider and determines that the user was recently authenticated. The identity provider then transmits the relevant information regarding the authentication process to the second service provider, which can then allow or deny the user access to the second service provider.
34 Citations
20 Claims
-
1. A class-based authentication system, comprising:
-
a network interface communicating with a memory; said memory communicating with a class-based authentication processor; and said class-based authentication processor, when executing a computer program, performs operations comprising; receiving, by said class-based authentication processor and from an authentication information system, authentication information comprising physical controls of a facility housing said authentication information system, wherein said authentication information system creates said authentication information in response to said authentication information system authenticating a user; determining, by said class-based authentication processor, that said authentication information substantially complies with a predetermined class established by said class-based authentication processor; and providing services, by said class-based authentication processor to said user, based upon said determining. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for facilitating authentication of a user comprising:
-
receiving, at a first computer system, information indicative of an identity of said user; authenticating, by said first computer system, said identity of said user; and transmitting, by said first computer system, authentication information from said first computer system to a second computer system, wherein said authentication information includes physical controls of a facility housing said first computer system, and wherein said second computer system allows access to said second computer system in response to determining, by said second computer system, that said authentication information substantially complies with a predetermined class established by said second computer system. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for facilitating authentication of a user comprising:
-
receiving, by a second computer system and from a first computer system, authentication information, wherein said authentication information includes physical controls of a facility housing said first computer, wherein said first computer system receives information indicative of an identity of said user and authenticates said identity of said user to create authentication information; and determining, by said second computer system, that said authentication information substantially complies with said predetermined class established by said second computer system; allowing, by said second computer system and in response to said determining, access to said second computer system.
-
Specification