×

Control of access to a secondary system

  • US 9,577,990 B2
  • Filed: 04/13/2015
  • Issued: 02/21/2017
  • Est. Priority Date: 12/21/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling access of a user to a secondary system, said method comprising:

  • a processor of a primary system receiving, from a user system connected to the secondary system, first authentication information comprising an encryption of a random string by a private key of a public/private key pair of a user logged on the user system, said encryption of the random string being a user-specific key;

    said processor generating second authentication information from protected secondary authentication data stored in the primary system, said generating the second authentication information comprising performing a decryption of the protected secondary authentication data by applying the user-specific key to the protected secondary authentication data to generate the second authentication information; and

    said processor providing the second authentication information to the secondary system to enable access of the user to the secondary system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×