×

Authentication based on previous authentications

  • US 9,686,262 B2
  • Filed: 05/07/2015
  • Issued: 06/20/2017
  • Est. Priority Date: 04/27/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method for authenticating a user to a target server, said method comprising:

  • receiving, by one or more processors of a computer system, a request from a user computer system to authenticate the user for access to N−

    1 target servers of N target servers at respective levels 1 through N−

    1 of N levels, wherein N is a positive integer of at least 2, wherein the N target servers are sequentially nested at respective levels of the N levels, wherein levels 1 through N are sequenced from lowest level to highest level, and wherein authentication of the user for access to the target server at level N requires prior authentication of the user for access to the target server at level 1 if N is 2 or for access to the N−

    1 target servers at the respective levels 1 through N−

    1 if N is at least 3;

    accessing, by the one or more processors, a stored authentication plan associated with the user, the stored authentication plan having one or more authentication records each having expected information relating to said authentication of the user for access to the N−

    1 target servers at the respective levels 1 through N−

    1;

    receiving, by the one or more processors, an indication that a current authentication plan exists in an authentication store, wherein the current authentication plan includes one or more authentication records, wherein each authentication record of the current authentication plan includes current information relating to authentication of the user for said access to the N−

    1 target servers at the respective levels 1 through N−

    1;

    in response to having received the indication that the current authentication plan exists in the authentication store, (i) requesting, by the one or more processors, the current authentication plan and (ii) receiving, by the one or more processors, the current authentication plan from the authentication store;

    determining, by the one or more processors, that there is at least a partial match between the current authentication plan and the stored authentication plan; and

    authenticating, by the one or more processors in response to said determining that there is at least the partial match, the user for access to the target server at level N.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×