System, method and computer program product for access authentication
First Claim
Patent Images
1. A method comprising:
- responsive to receiving an access request from a user for a secure resource in a first access session, logging an Internet Protocol (IP) address of the access request and transmitting a uniform resource locator (URL) to the user via an electronic mail message;
responsive to receiving a request for the URL in a second access session, logging an IP address corresponding to the URL request;
comparing the IP address logged from the first access session with the IP address logged from the second access session; and
responsive to verifying that the IP address corresponding to the first access session matches the IP address of the second access session, providing access to the secure resource.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and technique for access authentication includes: responsive to receiving an access request from a user for a secure resource, logging an Internet Protocol (IP) address of the access request; transmitting a uniform resource locator (URL) to the user via an electronic mail message; responsive to receiving a request for the URL, logging an IP address corresponding to the URL request; and responsive to validating the IP address corresponding to the URL request with the IP address of the access request, providing access to the secure resource.
18 Citations
20 Claims
-
1. A method comprising:
-
responsive to receiving an access request from a user for a secure resource in a first access session, logging an Internet Protocol (IP) address of the access request and transmitting a uniform resource locator (URL) to the user via an electronic mail message; responsive to receiving a request for the URL in a second access session, logging an IP address corresponding to the URL request; comparing the IP address logged from the first access session with the IP address logged from the second access session; and responsive to verifying that the IP address corresponding to the first access session matches the IP address of the second access session, providing access to the secure resource. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a processing unit having access to a secure resource; and an authentication module configured to; responsive to receiving an access request from a user for the secure resource in a first access session, log an Internet Protocol (IP) address of the access request and transmit a uniform resource locator (URL) to the user via an electronic mail message; responsive to receiving a request for the URL in a second access session, log an IP address corresponding to the URL request; compare the IP address logged from the first access session with the IP address logged from the second access session; and responsive to verifying that the IP address corresponding to the first access session matches the IP address of the second access session, authorize access to the secure resource. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product for having a computer program embodied on a computer-readable storage medium, the computer program executable to:
-
responsive to receiving an access request from a user for the secure resource in a first access session, log an Internet Protocol (IP) address of the access request and transmit a uniform resource locator (URL) to the user via an electronic mail message; responsive to receiving a request for the URL in a second access session, log an IP address corresponding to the URL request; compare the IP address logged from the first access session with the IP address logged from the second access session; and responsive to verifying that the IP address corresponding to the first access session matches the IP address of the second access session, authorize access to the secure resource. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification