×

Control of access to a secondary system

  • US 9,087,180 B2
  • Filed: 06/11/2013
  • Issued: 07/21/2015
  • Est. Priority Date: 12/21/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling access of a user to a secondary system, said method comprising:

  • a processor of a primary system sending a random string to a user system, said processor connecting the user system to the secondary system, said user being logged on the user system;

    after said sending the random string to the user system, said processor receiving from the user system first authentication information comprising an encryption of the random string by a private key of a public/private key pair of the user, said encryption of the random string being a user-specific key; and

    said processor storing, in the primary system, the user-specific key comprised by the received first authentication information;

    said processor generating second authentication information from protected secondary authentication data stored in the primary system, said generating the second authentication information comprising applying the user-specific key to the protected secondary authentication data to generate the second authentication information; and

    said processor providing the second authentication information to the secondary system to enable access of the user to the secondary system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×