×

System, method and computer program product for an authentication management infrastructure

  • US 8,132,226 B1
  • Filed: 12/04/2007
  • Issued: 03/06/2012
  • Est. Priority Date: 03/09/1999
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for allowing a user to access enterprise resources, the method comprising the steps of:

  • (1) implementing a policy on an authentication server, wherein the policy sets forth a plurality of guidelines for determining whether to authenticate at least one user and allow the at least one user to gain access to the enterprise resources, wherein at least one guideline establishes at least one predetermined qualification necessary for the at least one user to attain to pass the policy;

    (2) requiring the at least one user to establish authentication using at least two devices associated with the policy, wherein(i) if the policy is an OR policy, then requiring the user to establish authentication on only one of the at least two devices;

    (ii) if the policy is an AND policy, then requiring the user to establish authentication on all of the at least two devices;

    (iii) if the policy is a CONTINGENT policy, then requiring the user to exceed a minimum threshold associated with a first device or, if the user exceeds a contingent threshold associated with the first device, then requiring the user to exceed a minimum threshold associated with a second device;

    (iv) if the policy is a RANDOM policy, then requiring the user to establish authentication on a randomly selected device from the at least two devices;

    or(v) if the policy is a THRESHOLD policy, then requiring the user to exceed a total threshold value for the at least two devices;

    (3) creating a template for each said device, wherein said template includes data unique to a user;

    (4) once the at least one user attempts to attain the at least one predetermined qualification using the at least two devices, then;

    (a) allowing the user to proceed in attempting to pass any remaining qualifications of the policy, or(b) determining that the at least one user has failed the policy;

    (5) once the user has attains the at least one qualification, then determining that the at least one user is authenticated; and

    (6) allowing the at least one user to access the enterprise resources.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×