Security device provisioning
First Claim
1. A method for provisioning a security token object to a user for accessing a computing resource through a client computer system, the method comprising:
- receiving a security token object provisioning request from the client computer system for an external security token object interfacing with the client computer system;
transmitting an authentication request to the client computer system in response to receiving the security token object provisioning request;
authenticating the user against a user identity based upon a set of identity credentials received from the client computer system as provided by the user, the user identity being stored on a data store associated with the computing resource;
initiating the extraction of a unique token identifier from the external security token object without intervention from the user in response to a successful authentication of the user, wherein initiating the extraction of the unique token identifier comprises transmitting instructions to a web browser for initiating a security application running on the client computer system to read the unique token identifier from the external security token object; and
associating the unique token identifier received from the client computer system to the user identity in the data store;
wherein the user is authenticated for access to the computing resource based at least partially upon a subsequent validation of the external security token object against the unique token identifier retrieved from the data store.
8 Assignments
0 Petitions
Accused Products
Abstract
The provisioning of a security token object to a user is disclosed. The security token object is used for accessing a computing resource through a client computer system. A security token object provisioning request may be received from the client computer system. In response, an authentication request may be transmitted. The user is authenticated against a user identity based upon a set of received identity credentials provided by the user. The extraction of a unique token identifier from the security token object is initiated, and completed without intervention from the user. The unique token identifier received from the client computer system is associated with to the user identity in a data store. By providing the security token object, the user can gain access to the computing resource.
-
Citations
20 Claims
-
1. A method for provisioning a security token object to a user for accessing a computing resource through a client computer system, the method comprising:
-
receiving a security token object provisioning request from the client computer system for an external security token object interfacing with the client computer system; transmitting an authentication request to the client computer system in response to receiving the security token object provisioning request; authenticating the user against a user identity based upon a set of identity credentials received from the client computer system as provided by the user, the user identity being stored on a data store associated with the computing resource; initiating the extraction of a unique token identifier from the external security token object without intervention from the user in response to a successful authentication of the user, wherein initiating the extraction of the unique token identifier comprises transmitting instructions to a web browser for initiating a security application running on the client computer system to read the unique token identifier from the external security token object; and associating the unique token identifier received from the client computer system to the user identity in the data store; wherein the user is authenticated for access to the computing resource based at least partially upon a subsequent validation of the external security token object against the unique token identifier retrieved from the data store. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An article of manufacture comprising a non-transitory program storage medium readable by a data processing apparatus, the medium tangibly embodying one or more programs of instructions executable by the data processing apparatus to perform a method for provisioning an external security token object to a user for accessing a computing resource through a client computer system, the method comprising:
-
receiving a security token object provisioning request from the client computer system; transmitting an authentication request to the client computer system in response to receiving the security token object provisioning request; authenticating the user against a user identity based upon a set of identity credentials received from the client computer system as provided by the user, the user identity being stored on a data store associated with the computing resource; initiating the extraction of a unique token identifier from the external security token object without intervention from the user in response to a successful authentication of the user, wherein initiating the extraction of the unique token identifier comprises transmitting instructions to a web browser for initiating a security application running on the client computer system to read the unique token identifier from the external security token object; and associating the unique token identifier received from the client computer system to the user identity in the data store; wherein the user is authenticated for access to the computing resource based at least partially upon a subsequent validation of the external security token object against the unique token identifier retrieved from the data store. - View Dependent Claims (14, 15, 16)
-
-
17. A system for provisioning a security token object to a user for accessing a computing resource through a client device, the system comprising:
a computing system comprising one or more computing devices, said computing system programmed via executable instructions to at least; receive a security token object provisioning request from the client device for an external security token object interfacing with the client device; transmit an authentication request to the client device in response to receiving the security token object provisioning request; authenticate the user against a user identity based upon a set of identity credentials received from the client device as provided by the user, the user identity being stored on a data store associated with the computing resource; initiate the extraction of a unique token identifier from the external security token object without intervention from the user in response to a successful authentication of the user, wherein initiating the extraction of the unique token identifier comprises transmitting instructions to a web browser for initiating a security application running on the client device to read the unique token identifier from the external security token object; and associate the unique token identifier received from the client device to the user identity in the data store; wherein the user is authenticated for access to the computing resource based at least partially upon a subsequent validation of the external security token object against the unique token identifier retrieved from the data store. - View Dependent Claims (18, 19, 20)
Specification