×

System, method and computer program product for an authentication management infrastructure

  • US 8,707,388 B1
  • Filed: 01/26/2012
  • Issued: 04/22/2014
  • Est. Priority Date: 03/09/1999
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for allowing a user to access enterprise resources, the method comprising:

  • implementing a policy on an authentication server, wherein the policy sets forth a plurality of guidelines for determining whether to authenticate the user and to allow the user to gain access to the enterprise resources, wherein at least one first guideline establishes at least one predetermined first qualification necessary for the user to be authenticated to access the enterprise resources and wherein at least one second guideline establishes at least one predetermined second qualification necessary for the user to activate a silent signal for requesting assistance;

    requiring the user to establish authentication using at least two devices associated with the policy to meet the second qualification, wherein(i) if the policy is an OR policy, then requiring the user to establish authentication on only one of the at least two devices;

    (ii) if the policy is an AND policy, then requiring the user to establish authentication on all of the at least two devices;

    (iii) if the policy is a CONTINGENT policy, then requiring the user to exceed a minimum threshold associated with a first device or, if the user exceeds a contingent threshold associated with the first device, then requiring the user to exceed a minimum threshold associated with a second device;

    (iv) if the policy is a RANDOM policy, then requiring the user to establish authentication on a randomly selected device from the at least two devices;

    or(v) if the policy is a THRESHOLD policy, then requiring the user to exceed a total threshold value for the at least two devices;

    creating a template for each device, wherein said template includes data unique to the user;

    determining whether the user has activated the silent signal when the user attains the at least one predetermined second qualification; and

    requesting assistance for the user if the silent signal is activated.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×