System, method and computer program product for an authentication management infrastructure
First Claim
1. A method for allowing a user to access enterprise resources, the method comprising:
- implementing a policy on an authentication server, wherein the policy sets forth a plurality of guidelines for determining whether to authenticate the user and to allow the user to gain access to the enterprise resources, wherein at least one first guideline establishes at least one predetermined first qualification necessary for the user to be authenticated to access the enterprise resources and wherein at least one second guideline establishes at least one predetermined second qualification necessary for the user to activate a silent signal for requesting assistance;
requiring the user to establish authentication using at least two devices associated with the policy to meet the second qualification, wherein(i) if the policy is an OR policy, then requiring the user to establish authentication on only one of the at least two devices;
(ii) if the policy is an AND policy, then requiring the user to establish authentication on all of the at least two devices;
(iii) if the policy is a CONTINGENT policy, then requiring the user to exceed a minimum threshold associated with a first device or, if the user exceeds a contingent threshold associated with the first device, then requiring the user to exceed a minimum threshold associated with a second device;
(iv) if the policy is a RANDOM policy, then requiring the user to establish authentication on a randomly selected device from the at least two devices;
or(v) if the policy is a THRESHOLD policy, then requiring the user to exceed a total threshold value for the at least two devices;
creating a template for each device, wherein said template includes data unique to the user;
determining whether the user has activated the silent signal when the user attains the at least one predetermined second qualification; and
requesting assistance for the user if the silent signal is activated.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for allowing a user to access enterprise resources comprising authentication devices and an authentication server. The authentication devices allow a user to enter authentication data. The authentication server is in communication with the authentication devices. The authentication server comprises a policy database storing a policy. The policy comprises guidelines including a first guideline establishes a qualification necessary for the user to access enterprise resources and a second guideline establishes a qualification necessary for the user to activate a silent signal. The authentication server is adapted to request assistance for the user if the silent signal is activated.
137 Citations
14 Claims
-
1. A method for allowing a user to access enterprise resources, the method comprising:
-
implementing a policy on an authentication server, wherein the policy sets forth a plurality of guidelines for determining whether to authenticate the user and to allow the user to gain access to the enterprise resources, wherein at least one first guideline establishes at least one predetermined first qualification necessary for the user to be authenticated to access the enterprise resources and wherein at least one second guideline establishes at least one predetermined second qualification necessary for the user to activate a silent signal for requesting assistance; requiring the user to establish authentication using at least two devices associated with the policy to meet the second qualification, wherein (i) if the policy is an OR policy, then requiring the user to establish authentication on only one of the at least two devices; (ii) if the policy is an AND policy, then requiring the user to establish authentication on all of the at least two devices; (iii) if the policy is a CONTINGENT policy, then requiring the user to exceed a minimum threshold associated with a first device or, if the user exceeds a contingent threshold associated with the first device, then requiring the user to exceed a minimum threshold associated with a second device; (iv) if the policy is a RANDOM policy, then requiring the user to establish authentication on a randomly selected device from the at least two devices;
or(v) if the policy is a THRESHOLD policy, then requiring the user to exceed a total threshold value for the at least two devices; creating a template for each device, wherein said template includes data unique to the user; determining whether the user has activated the silent signal when the user attains the at least one predetermined second qualification; and requesting assistance for the user if the silent signal is activated. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for allowing a user to access enterprise resources, the method comprising:
-
implementing a policy on an authentication server, wherein the policy sets forth a plurality of guidelines for determining whether to authenticate the user and to allow the user to gain access to the enterprise resources, wherein at least one first guideline establishes at least one predetermined first qualification necessary for the user to be authenticated to access the enterprise resources and wherein at least one second guideline establishes at least one predetermined second qualification necessary for the user to attain to pass the policy, and wherein the policy is formed by selecting one or more devices that the user must be tested on in order to activate a silent signal; requiring the user to establish authentication using at least two devices associated with the policy to meet the second qualification, wherein (i) if the policy is an OR policy, then requiring the user to establish authentication on only one of the at least two devices; (ii) if the policy is an AND policy, then requiring the user to establish authentication on all of the at least two devices; (iii) if the policy is a CONTINGENT policy, then requiring the user to exceed a minimum threshold associated with a first device or, if the user exceeds a contingent threshold associated with the first device, then requiring the user to exceed a minimum threshold associated with a second device; (iv) if the policy is a RANDOM policy, then requiring the user to establish authentication on a randomly selected device from the at least two devices;
or(v) if the policy is a THRESHOLD policy, then requiring the user to exceed a total threshold value for the at least two devices; determining whether the user has activated the silent signal when the user attains the at least one predetermined second qualification; and requesting assistance for the user if the silent signal is activated. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system for allowing a user to access enterprise resources comprising:
-
one or more authentication test devices that allow a user to enter authentication data; and an authentication server in communication with the one or more authentication test devices that authenticates the authentication data, the authentication server comprising a policy database storing a policy, the policy implemented by the authentication server; wherein the policy comprises a plurality of guidelines for determining whether to authenticate the user and to allow the user to gain access to the enterprise resources, wherein at least one first guideline establishes at least one predetermined first qualification necessary for the user to be authenticated to access the enterprise resources and wherein at least one second guideline establishes at least one predetermined second qualification necessary for the user to attain to pass the policy and wherein the policy is formed by the authentication server selecting two of the one or more authentication devices test devices that the user must be tested on in order to activate a silent signal; wherein the authentication server is adapted to request assistance for the user if the silent signal is activated; and the authentication server further comprising an authentication unit that determines whether the user has activated the silent signal based on the predetermined second qualification and an output from the test devices and requiring the user to establish authentication using at the least two test devices to meet the second qualification, wherein (i) if the policy is an OR policy, then requiring the user to establish authentication on only one of the at least two test devices; (ii) if the policy is an AND policy, then requiring the user to establish authentication on all of the at least two test devices; (iii) if the policy is a CONTINGENT policy, then requiring the user to exceed a minimum threshold associated with a first test device or, if the user exceeds a contingent threshold associated with the first device, then requiring the user to exceed a minimum threshold associated with a second test device; (iv) if the policy is a RANDOM policy, then requiring the user to establish authentication on a randomly selected device from the at least two test devices;
or(v) if the policy is a THRESHOLD policy, then requiring the user to exceed a total threshold value for the at least two test devices. - View Dependent Claims (12, 13, 14)
-
Specification