Method and system for controlling access to a secondary system
First Claim
1. A method for controlling access of a user to a secondary system, said user being logged on a user system, a primary system connecting the user system to the secondary system, said method comprising:
- said primary system receiving first authentication information from the user system;
said primary system determining that a decryption or an encryption of the first authentication information is equal to protected primary authentication data stored in the primary system, followed by said primary system providing access of the user to the primary system;
after said providing access of the user to the primary system, said primary system generating a user-specific key consisting of either the first authentication information or an encryption of the first authentication information;
said primary system generating second authentication information from protected secondary authentication data stored in the primary system, said generating the second authentication information comprising using applying the user-specific key to the protected secondary authentication data to generate the second authentication information; and
said primary system providing the second authentication information to the secondary system to enable access of the user to the secondary system,wherein the method further comprises;
said primary system sending a random string to the user system, wherein the random string is derived from user-specific data pertaining to the user; and
responsive to said sending the random string, said primary system receiving from the user system an encryption of the random string by a private key of the user, wherein the first authentication information is the encryption of the random string, and wherein said generating the user-specific key comprises setting the user-specific key equal to the encryption of the random string.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for controlling access of a user to a secondary system. The user is logged on a user system. A primary system connects the user system to the secondary system. A first authentication information is received from the user system. After determining that the first authentication information conforms to protected primary authentication data included in the primary system, access of the user to the primary system is provided followed by generation of a user-specific key from the first authentication information. Second authentication information is derived from protected secondary authentication data included in the primary system, by use of the user-specific key in conjunction with the protected secondary authentication data. The second authentication information is provided to the secondary system to enable access of the user to the secondary system.
-
Citations
23 Claims
-
1. A method for controlling access of a user to a secondary system, said user being logged on a user system, a primary system connecting the user system to the secondary system, said method comprising:
-
said primary system receiving first authentication information from the user system; said primary system determining that a decryption or an encryption of the first authentication information is equal to protected primary authentication data stored in the primary system, followed by said primary system providing access of the user to the primary system; after said providing access of the user to the primary system, said primary system generating a user-specific key consisting of either the first authentication information or an encryption of the first authentication information; said primary system generating second authentication information from protected secondary authentication data stored in the primary system, said generating the second authentication information comprising using applying the user-specific key to the protected secondary authentication data to generate the second authentication information; and said primary system providing the second authentication information to the secondary system to enable access of the user to the secondary system, wherein the method further comprises; said primary system sending a random string to the user system, wherein the random string is derived from user-specific data pertaining to the user; and responsive to said sending the random string, said primary system receiving from the user system an encryption of the random string by a private key of the user, wherein the first authentication information is the encryption of the random string, and wherein said generating the user-specific key comprises setting the user-specific key equal to the encryption of the random string. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product comprising a computer readable storage device storing computer executable instructions that when executed by a processor of a primary system perform a method for controlling access of a user to a secondary system, said user being logged on a user system, said primary system connecting the user system to the secondary system, said method comprising:
-
said primary system receiving first authentication information from the user system; said primary system determining that a decryption or an encryption of the first authentication information is equal to protected primary authentication data stored in the primary system, followed by said primary system providing access of the user to the primary system; after said providing access of the user to the primary system, said primary system generating a user-specific key consisting of either the first authentication information or an encryption of the first authentication information; said primary system generating second authentication information from protected secondary authentication data stored in the primary system, said generating the second authentication information comprising applying the user-specific key to the protected secondary authentication data to generate the second authentication information; and said primary system providing the second authentication information to the secondary system to enable access of the user to the secondary system, wherein the method further comprises; said primary system sending a random string to the user system, wherein the random string is derived from user-specific data pertaining to the user; and responsive to said sending the random string, said primary system receiving from the user system an encryption of the random string by a private key of the user, wherein the first authentication information is the encryption of the random string, wherein said determining that said decryption or encryption of the first authentication information is equal to the protected primary authentication data comprises decrypting the first authentication information by use of a public key that is associated with the private key followed by determining that the decrypted first authentication information is equal to the protected primary authentication data, and wherein said generating the user-specific key comprises setting the user-specific key equal to the encryption of the random string. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A primary system comprising a processor and a computer program product, said computer program product comprising computer executable instructions that when executed by the processor perform a method for controlling access of a user to a secondary system when the user is logged on a user system subject to the primary system connecting the user system to the secondary system, said method comprising:
-
said primary system receiving first authentication information from the user system; said primary system determining that a decryption or an encryption of the first authentication information is equal to protected primary authentication data stored in the primary system, followed by said primary system providing access of the user to the primary system; after said providing access of the user to the primary system, said primary system generating a user-specific key consisting of either the first authentication information or an encryption of the first authentication information; said primary system generating second authentication information from protected secondary authentication data stored in the primary system, said generating the second authentication information comprising applying the user-specific key to the protected secondary authentication data to generate the second authentication information; and said primary system providing the second authentication information to the secondary system to enable access of the user to the secondary system, wherein the method further comprises; said primary system sending a random string to the user system, wherein the random string is derived from user-specific data pertaining to the user; and responsive to said sending the random string, said primary system receiving from the user system an encryption of the random string by a private key of the user, wherein the first authentication information is the encryption of the random string, and wherein said generating the user-specific key comprises setting the user-specific key equal to the encryption of the random string. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification