Keyfob for use with multiple authentication entities
First Claim
1. A computer implemented method, the method comprising:
- receiving an access request, wherein the access request comprises a token generated by a token generator in synchronization with an authentication entity, wherein the access request comprises an identifier for the authentication entity that is selected from a plurality of different identifiers for corresponding different authentication entities, and wherein the different identifiers are stored at the token generator;
in a local computer that serves as an authentication entity for authenticating access requests that comprise an identifier for the local computer, determining that the local computer is not the authentication entity corresponding to the token;
transmitting to the authentication entity an authentication request corresponding to the access request, thereby allowing the authentication entity to authenticate the access request based at least on the token; and
responsive to the access request being authenticated, granting the access request.
0 Assignments
0 Petitions
Accused Products
Abstract
A token generator such as a keyfob is used to access the computer of an authentication entity different from the authentication entity that issued the token generator. The token generator stores authentication entity identification information identifying the authentication entity that issued the token generator. The token generator causes a user computer to transmit an authentication request including such authentication entity identification information together with a token generated in synchronization with the authentication entity issuing the token generator, so that the authentication request can be routed to the appropriate authentication entity that issued the keyfob for validation. The authentication request can be sent directly to the authentication entity that issued the token generator. The authentication request can also be sent to the authentication entity that issued the token generator via another authentication entity to which the user computer attempts to access.
11 Citations
17 Claims
-
1. A computer implemented method, the method comprising:
-
receiving an access request, wherein the access request comprises a token generated by a token generator in synchronization with an authentication entity, wherein the access request comprises an identifier for the authentication entity that is selected from a plurality of different identifiers for corresponding different authentication entities, and wherein the different identifiers are stored at the token generator; in a local computer that serves as an authentication entity for authenticating access requests that comprise an identifier for the local computer, determining that the local computer is not the authentication entity corresponding to the token; transmitting to the authentication entity an authentication request corresponding to the access request, thereby allowing the authentication entity to authenticate the access request based at least on the token; and responsive to the access request being authenticated, granting the access request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer implemented method, the method comprising:
-
receiving an authentication request from a server at an authentication entity which is different from the server, wherein the server serves as an authentication entity for authenticating access requests that comprise an identifier for the server; wherein the authentication request corresponds to an access request generated at a user computer for accessing the server, and wherein the authentication request comprises an identifier for the authentication entity that is selected from a plurality of different identifiers for corresponding different authentication entities; and wherein the authentication request comprises a token generated by a token generator in synchronization with the authentication entity, wherein the different identifiers are stored at the token generator; authenticating the access request based at least on the token; and transmitting the authentication to the server, thereby allowing the server to grant access in response to the access response. - View Dependent Claims (10, 11)
-
-
12. A computer system, comprising:
-
a processor; a memory; a receiving mechanism configured to receive an access request; wherein the access request comprises a token generated by a token generator in synchronization with an authentication entity, wherein the access request comprises an identifier for the authentication entity that is selected from a plurality of different identifiers for corresponding different authentication entities, and wherein the different identifiers are stored at the token generator; a determination mechanism configured to determine that a local computer is not the authentication entity corresponding to the token, wherein in the local computer serves as an authentication entity for authenticating access requests that comprise an identifier for the local computer; a transmission mechanism configured to transmit to the authentication entity an authentication request corresponding to the access request, thereby allowing the authentication entity to authenticate the access request based at least on the token; and responsive to the access request being authenticated, granting the access request. - View Dependent Claims (13, 14)
-
-
15. An authentication system, comprising:
-
a processor; a memory; a receiving mechanism configured to receive an authentication request from a server at the authentication entity which is different from the server, wherein the server serves as an authentication entity for authenticating access requests that comprise an identifier for the server; wherein the authentication request corresponds to an access request generated at a user computer for accessing the server, and wherein the authentication request comprises an identifier for the authentication entity that is selected from a plurality of different identifiers for corresponding different authentication entities; and wherein the authentication request comprises a token generated by a token generator in synchronization with the authentication entity, wherein the different identifiers are stored at the token generator; an authentication mechanism configured to authenticate the access request based at least on the token; and a transmission mechanism configured to transmit the authentication to the server, thereby allowing the server to grant access in response to the access response. - View Dependent Claims (16, 17)
-
Specification