Method and apparatus for user identity verification
First Claim
1. A method of identifying a user accessing a target system, comprising:
- receiving a first private key;
validating user access to the target system based on the first private key and a first public key accessible by the target system;
transmitting a request for a validation of user identity to a second system storing a second public key inaccessible to the user; and
receiving the validation of user identity from the second system based on the second public key and a second private key stored at an initial system of the user.
3 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure describes a method and apparatus for user identity verification as a user migrates amongst systems, servers, computing environments and/or segments within a cloud computing environment. A user currently accessing a first system seeks to migrate from the first system to a target system. The target system validates whether the user may access the target system based on a first private key and a first public key. A verification system maintains a second public key that is based on an identity of the user and inaccessible to the user. The verification system receives a second private key from an initial system of the user. Based on the second private/public keys, the verification system sends a validation of user identity to the target system.
26 Citations
20 Claims
-
1. A method of identifying a user accessing a target system, comprising:
-
receiving a first private key; validating user access to the target system based on the first private key and a first public key accessible by the target system; transmitting a request for a validation of user identity to a second system storing a second public key inaccessible to the user; and receiving the validation of user identity from the second system based on the second public key and a second private key stored at an initial system of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A tangible computer readable storage device storing computer program instructions for identifying a user accessing a target system, which, when executed on a processor, cause the processor to perform operations comprising:
-
receiving a first private key; validating user access to the target system based on the first private key and a first public key accessible by the target system; transmitting a request for a validation of user identity to a second system storing a second public key inaccessible to the user; and receiving the validation of user identity from the second system based on the second public key and a second private key stored at an initial system of the user. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. An apparatus comprising:
-
a memory storing computer program instructions for identifying a user accessing a target system; a processor communicatively coupled to the memory, the processor configured to execute the computer program instructions, which, when executed on the processor, cause the processor to perform operations comprising; receiving a first private key; validating user access to the target system based on the first private key and a first public key accessible by the target system; transmitting a request for a validation of user identity to a second system storing a second public key inaccessible to the user; and receiving the validation of user identity from the second system based on the second public key and a second private key stored at an initial system of the user. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification