×

Systems and methods for managing credentials used to authenticate access in data processing systems

  • US 10,462,152 B2
  • Filed: 11/15/2016
  • Issued: 10/29/2019
  • Est. Priority Date: 11/15/2016
  • Status: Active Grant
First Claim
Patent Images

1. A system comprising:

  • a processor and memory; and

    machine readable instructions stored in the memory and executed by the processor, configured to;

    receive a first request to replace a first credential used to access one or more resources with a second credential that is to be subsequently used to access the one or more resources;

    in response to receiving the first request, perform a transitional secret procedure by replacing the first credential with the second credential and by allowing temporary subsequent use of the first credential to access the one or more resources for a predetermined period, wherein a length of the predetermined period is based on a determined level of access associated with a requesting device that is using the first credential to request access to the one or more resources during the predetermined period, such that the predetermined period is different for different levels of access;

    as a part of performing the transitional secret procedure, cause the transitional secret procedure to be transparent to the requesting device such that only the system, which operates as a central authentication system for granting or denying requests to access the one or more resources, is knowledgeable that both the first credential and the second credential are usable to access the one or more resources during the predetermined period; and

    in response to receiving a second request to access the one or more resources using the first credential after replacing the first credential with the second credential, where the second request is received from the requesting device;

    allow the requesting device to access the one or more resources using the first credential during the predetermined period, wherein both the first credential and the second credential are usable to access the one or more resources during the predetermined period, which is based on the determined level of access of the requesting device; and

    generate an indication for a system administrator that the first credential was used to access the one or more resources.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×