Consolidated authentication
First Claim
1. A method for authenticating a user at a first computer to first and second applications installed in a second computer, the method comprising:
- said second computer receiving from the user a first request to access the first application, and in response, the second computer redirecting the first request to a third computer, and in response, the third computer determining that the user was previously authenticated and notifying the second computer that the user is authentic, and in response, the second computer returning a first session key to the third computer, said first session key enabling a session with the first application but not with the second application; and
wherein a second session key was sent by the third computer to the first computer in response to the third computer having received the first session key from the second computer,wherein the first, second, and third computers are three different computers,wherein the first and second applications installed in the second computer are different applications, andwherein the second session key enables a session with both the first application and the second application.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for authenticating a user at a first computer to first and second applications installed in a second computer. The second computer receives from the user a first request to access the first application, and in response, the second computer redirects the first request to a third computer, and in response, the third computer determines that the user was previously authenticated and so notifies the second computer, and in response, the second computer returns a first session key to the third computer. The first session key enables a session with the first application but not with the second application. A second session key was sent by the third computer to the first computer after the third computer received the first session key from the second computer. The second session key enables a session with both the first application and the second application.
-
Citations
18 Claims
-
1. A method for authenticating a user at a first computer to first and second applications installed in a second computer, the method comprising:
-
said second computer receiving from the user a first request to access the first application, and in response, the second computer redirecting the first request to a third computer, and in response, the third computer determining that the user was previously authenticated and notifying the second computer that the user is authentic, and in response, the second computer returning a first session key to the third computer, said first session key enabling a session with the first application but not with the second application; and wherein a second session key was sent by the third computer to the first computer in response to the third computer having received the first session key from the second computer, wherein the first, second, and third computers are three different computers, wherein the first and second applications installed in the second computer are different applications, and wherein the second session key enables a session with both the first application and the second application. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product, comprising one or more computer readable hardware storage devices having computer readable program code stored therein, said program code containing instructions executable by one or more processors of a computer system to implement a method for authenticating a user at a first computer to first and second applications installed in a second computer, said method comprising:
-
said second computer receiving from the user a first request to access the first application, and in response, the second computer redirecting the first request to a third computer, and in response, the third computer determining that the user was previously authenticated and notifying the second computer that the user is authentic, and in response, the second computer returning a first session key to the third computer, said first session key enabling a session with the first application but not with the second application, wherein a second session key was sent by the third computer to the first computer in response to the third computer having received the first session key from the second computer, wherein the first, second, and third computers are three different computers, wherein the first and second applications installed in the second computer are different applications, and wherein the second session key enables a session with both the first application and the second application. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer system, comprising one or more processors, one or more memories, and one or more computer readable hardware storage devices, said one or more hardware storage device containing program code executable by the one or more processors via the one or more memories to implement a method for authenticating a user at a first computer to first and second applications installed in a second computer, said method comprising:
-
said second computer receiving from the user a first request to access the first application, and in response, the second computer redirecting the first request to a third computer, and in response, the third computer determining that the user was previously authenticated and notifying the second computer that the user is authentic, and in response, the second computer returning a first session key to the third computer, said first session key enabling a session with the first application but not with the second application, wherein a second session key was sent by the third computer to the first computer in response to the third computer having received the first session key from the second computer, wherein the first, second, and third computers are three different computers, wherein the first and second applications installed in the second computer are different applications, and wherein the second session key enables a session with both the first application and the second application. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification