×

Authentication based on previous authentications

  • US 9,094,393 B2
  • Filed: 11/11/2013
  • Issued: 07/28/2015
  • Est. Priority Date: 04/27/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for authenticating a user to a target server, the method comprising:

  • receiving, by a computer system having at least one processor coupled to memory, a request from a user computer system to authenticate the user for access to a target server at level N of N levels, wherein N is a positive integer of at least 2, wherein N target servers are sequentially nested at respective levels of the N levels denoted as levels 1 through N sequenced from lowest level to highest level, and wherein authentication of the user for access to the target server at level N requires prior authentication of the user for access to the target server at level 1 if N is 2 or for access to the N−

    1 target servers at the respective levels 1 through N−

    1 if N is at least 3;

    accessing, by the computer system, a stored authentication plan associated with the user, the stored authentication plan having one or more authentication records each having expected information relating to authentication of the user for access to the N−

    1 target servers at the respective levels 1 through N−

    1;

    receiving, by the computer system, an indication of whether a current authentication plan exists in an authentication store, the current authentication plan having one or more authentication records, each authentication record having current information relating to authentication of the user for access to the N−

    1 target servers at the respective levels 1 through N−

    1;

    in response to having received a determination that the current authentication plan exists, (i) requesting, by the computer system, the current authentication plan and (ii) receiving, by the computer system, the current authentication plan from the authentication store;

    determining, by the computer system, that there is at least a partial match between the stored authentication plan and the current authentication plan; and

    authenticating in response to said determining that there is at least the partial match, by the computer system, the user for access to the target server at level N.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×