Data replication across enterprise boundaries
First Claim
1. A method, comprising:
- receiving a user token identifier and a one-time password from a client device at a first server;
validating the one-time password at the first server based on first verification information stored in a first database, the first verification information being associated with the user token identifier, wherein the first database is within a first network;
updating the first verification information in the first database to indicate that the one-time password has been used;
initiating an update to a second database by pushing the first verification information and a site ID of the first database from the first database to the second database via a first SSL tunnel, wherein the second database is within a second network that is outside an enterprise boundary of the first network;
initiating an update to the first database by pulling second verification information from the second database to the first database via a second SSL tunnel; and
updating the first verification information in the first database based on the second verification information pulled from the second database,wherein at least one of the second database or the first database resolves which of the first verification information or second verification information to apply based on at least one of;
unique data within the first verification information or the second verification information, timestamp data within the first verification information or the second verification information, or an authority assigned to the at least one of the second database or the first database with the first verification information or the second verification information.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for synchronizing verification data in a distributed database including client and server databases. The server database may exchange verification data regarding one-time passwords to multiple client databases. An update to the server database may be initiated based on information stored in the client database by pushing updated verification information from the client database to the server database via an SSL tunnel. An update to the client database may be initiated based on information stored in the server database by pulling updated verification data from the server database to the client database via an SSL tunnel. The client database and the server database may include a two-dimensional data field including the verification data and an associated key identifier, and a site ID. The site ID may include a unique identifier to identify the respective database in which it is included. The data field may include a sequence number assigned to each row of data that increases every time the row of information is updated. The client database and the server database may also include a replication tracking table including a record of the last known update to a remote database. Data fields that require updating may be determined based on the site ID and a comparison of the sequence numbers from the replication tracking table and the server'"'"'s database.
-
Citations
24 Claims
-
1. A method, comprising:
-
receiving a user token identifier and a one-time password from a client device at a first server; validating the one-time password at the first server based on first verification information stored in a first database, the first verification information being associated with the user token identifier, wherein the first database is within a first network; updating the first verification information in the first database to indicate that the one-time password has been used; initiating an update to a second database by pushing the first verification information and a site ID of the first database from the first database to the second database via a first SSL tunnel, wherein the second database is within a second network that is outside an enterprise boundary of the first network; initiating an update to the first database by pulling second verification information from the second database to the first database via a second SSL tunnel; and updating the first verification information in the first database based on the second verification information pulled from the second database, wherein at least one of the second database or the first database resolves which of the first verification information or second verification information to apply based on at least one of;
unique data within the first verification information or the second verification information, timestamp data within the first verification information or the second verification information, or an authority assigned to the at least one of the second database or the first database with the first verification information or the second verification information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 21, 24)
-
-
10. A method comprising:
-
receiving a request to update a server database from a first client database, the request comprising verification information of a user and a site ID of the first client database, wherein the verification information of the user relates to one-time passwords that are verified using at least one of the first client database, a second client database, or the server database, wherein the request is pushed from the first client database to the server database, wherein the first client database is within a first network; updating verification information stored in the server database based on the verification information from the first client database, wherein the server database is within a second network that is outside an enterprise boundary of the first network; receiving a request to update at least one of the first client database or the second client database by pulling the verification information from the server database to the at least one of the first client database or the second client database via an SSL tunnel; and sending the verification information to the at least one of the first client database or the second client database requesting the verification information from the server database, wherein at least one of the second database or the first database resolves which of a first verification information or a second verification information of the verification information to apply based on at least one of;
unique data within the first verification information or the second verification information, timestamp data within the first verification information or the second verification information, or an authority assigned to the at least one of the second database or the first database with the first verification information or the second verification information. - View Dependent Claims (11, 12, 13, 14, 15, 22)
-
-
16. A method comprising:
-
receiving an identifier and a one-time password at a client; validating the one-time password at the client based on verification information stored in a client database, the verification information being associated with the identifier; performing an update operation to first verification information in the client database to indicate that the one-time password has been used, wherein the client database is within a first network; initiating an update to a server database from the client database by pushing first verification information and a site ID of the client database from the client database to the server database, the site ID comprising a geographic identifier to identify the client database, wherein the server database is within a second network that is outside an enterprise boundary of the first network; initiating an update to second verification information in the client database from the server database by pulling first verification information from the server database to the client database; and updating the second verification information in the client database based on first verification information pulled from the server database, wherein at least one of the server database or the client database resolves which of the first verification information or second verification information to apply based on at least one of;
unique data within the first verification information or the second verification information, timestamp data within the first verification information or the second verification information, or an authority assigned to the at least one of the server database or the client database with the first verification information or the second verification information.- View Dependent Claims (17, 18, 19, 20, 23)
-
Specification