×

Authentication based on previous authentications

  • US 8,726,347 B2
  • Filed: 04/27/2007
  • Issued: 05/13/2014
  • Est. Priority Date: 04/27/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for authenticating a user to a target server, the method comprising the steps of:

  • receiving, by a computer system having at least one processor coupled to memory, a request from a user computer system to authenticate the user for access to a target server at level N of N levels, wherein N is a positive integer of at least 2, wherein N target servers are sequentially nested at respective levels of the N levels denoted as levels 1 through N sequenced from lowest level to highest level, and wherein authentication of the user for access to the target server at level N requires prior authentication of the user for access to the target server at level 1 if N is 2 or for access to the N−

    1 target servers at the respective levels 1 through N−

    1 if N is at least 3;

    determining, by the computer system, that an authentication plan is required to authenticate the user for access to the target server at level N, wherein the authentication plan comprises one or more defined authentication steps that must be performed before the user is allowed to authenticate for access to each target server at the N levels;

    in response to the step of determining that the authentication plan is required to authenticate the user for access to the target server at level N, accessing, by the computer system, a stored authentication plan associated with the user, the stored authentication plan having one or more authentication records each having expected information relating to authentication of the user for access to the N−

    1 target servers at the respective levels 1 through N−

    1;

    receiving, by the computer system, a current authentication plan for the user from a storage device, the current authentication plan having one or more authentication records each having current information relating to authentication of the user for access to the N−

    1 target servers at the respective levels 1 through N−

    1;

    comparing, by the computer system, the stored authentication plan with the current authentication plan to determine, based on analyzing authentication events, whether there is at least a partial match between the stored authentication plan and the current authentication plan; and

    authenticating, by the computer system, the user at level N if said comparing the stored authentication plan with the current authentication plan determines that there is at least the partial match between the stored authentication plan and the current authentication plan.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×