×

Data replication across enterprise boundaries

  • US 9,286,369 B2
  • Filed: 12/30/2009
  • Issued: 03/15/2016
  • Est. Priority Date: 12/30/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • receiving a user token identifier and a one-time password from a client device at a first server;

    validating the one-time password at the first server based on first verification information stored in a first database, the first verification information being associated with the user token identifier, wherein the first database is within a first network;

    updating the first verification information in the first database to indicate that the one-time password has been used;

    initiating an update to a second database by pushing the first verification information and a site ID of the first database from the first database to the second database via a first SSL tunnel, wherein the second database is within a second network that is outside an enterprise boundary of the first network;

    initiating an update to the first database by pulling second verification information from the second database to the first database via a second SSL tunnel; and

    updating the first verification information in the first database based on the second verification information pulled from the second database,wherein at least one of the second database or the first database resolves which of the first verification information or second verification information to apply based on at least one of;

    unique data within the first verification information or the second verification information, timestamp data within the first verification information or the second verification information, or an authority assigned to the at least one of the second database or the first database with the first verification information or the second verification information.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×