Methods and systems for establishing secure authenticated bidirectional server communication using automated credential reservation
First Claim
Patent Images
1. A method of authenticating communications, the method comprising acts of:
- receiving, by a computer, a first set of credentials;
verifying the first set of credentials by comparing the first set of credentials to a plurality of sets of credentials stored in a database;
subsequent to verifying the first set of credentials, creating a second set of credentials by the computer;
transmitting the second set of credentials to a remote computer;
receiving, by the computer, the second set of credentials from the remote computer;
providing, by the computer to the remote computer, unsolicited access to services provided by the computer responsive to receiving the second set of credentials, the services being configured to receive events posted to the computer by the remote computer; and
in response to at least one event, automatically changing at least one of the first set of credentials and the second set of credentials using the at least one of the first set of credentials and the second set of credentials as a seed for determining a new set of credentials to replace the at least one of the first set of credentials and the second set of credentials.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of authenticating communications includes receiving, by a computer, a first set of credentials, verifying the first set of credentials by comparing the first set of credentials to a plurality of sets of credentials stored in a database, subsequent to verifying the first set of credentials, deriving a second set of credentials, and transmitting notification of the second set of credentials to a remote computer.
32 Citations
18 Claims
-
1. A method of authenticating communications, the method comprising acts of:
-
receiving, by a computer, a first set of credentials; verifying the first set of credentials by comparing the first set of credentials to a plurality of sets of credentials stored in a database; subsequent to verifying the first set of credentials, creating a second set of credentials by the computer; transmitting the second set of credentials to a remote computer; receiving, by the computer, the second set of credentials from the remote computer;
providing, by the computer to the remote computer, unsolicited access to services provided by the computer responsive to receiving the second set of credentials, the services being configured to receive events posted to the computer by the remote computer; andin response to at least one event, automatically changing at least one of the first set of credentials and the second set of credentials using the at least one of the first set of credentials and the second set of credentials as a seed for determining a new set of credentials to replace the at least one of the first set of credentials and the second set of credentials. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of authenticating communications between a first computer and a second computer, the method comprising acts of:
-
receiving, from a user, a first set of credentials at the first computer; receiving, from the user, the first set of credentials at the second computer;
calling, by the second computer, a first service operating on the first computer, the first service configured to provide verification of the first set of credentials to the second computer;responsive to receiving the verification of the first set of credentials from the first computer, creating a second set of credentials by the second computer; transmitting, by the second computer, the second set of credentials to the first computer; receiving, by the second computer, the second set of credentials from the first computer; providing, by the second computer to the first computer, unsolicited access to services provided by the second computer responsive to receiving the second set of credentials, the services being configured to receive events posted to the second computer by the first computer; and in response to at least one event, automatically changing at least one of the first set of credentials and the second set of credentials using the at least one of the first set of credentials and the second set of credentials as a seed for determining a new set of credentials to replace the at least one of the first set of credentials and the second set of credentials. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A data center infrastructure management system, comprising:
-
a network; a first server connected to the network; a plurality of data center infrastructure devices connected to the first server, the first server being configured to maintain device data related to management of the plurality of data center infrastructure devices; and a second server connected to the network and configured to verify a set of user-created credentials, to be supplied by the first server, by comparing the set of user-created credentials to a plurality of sets of user-created credentials stored in a database, the second server further configured to receive requests from a user, the second server further configured to create a set of server-created credentials based on the set of user-created credentials subsequent to verifying the set of user-created credentials, the second server further configured to transmit the set of server-created credentials to the first server subsequent to creating the set of server-created credentials; wherein the first server uses the set of server-created credentials to secure communication with the second server for exchanging the device data with the second server, wherein the second server provides the first server with unsolicited access to services provided by the second server responsive to receiving the server-created credentials, the services being configured to receive events posted to the second server by the first server based, and wherein in response to at least one event, automatically changing at least one of the first set of credentials and the second set of credentials using the at least one of the first set of credentials and the second set of credentials as a seed for determining a new set of credentials to replace the at least one of the first set of credentials and the second set of credentials. - View Dependent Claims (18)
-
Specification