×

System, method and computer program product for providing unified authentication services for online applications

  • US 9,438,633 B1
  • Filed: 04/10/2015
  • Issued: 09/06/2016
  • Est. Priority Date: 03/23/2000
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • assigning, by a user management server, a globally unique ID (GUID) for a user;

    receiving, by the user management server, a first username for a first website associated with a first account of the user and a second username for a second website associated with a second account of the user;

    associating, by the user management server, the first username and the second username with the GUID;

    establishing, by the user management server, a first policy component of an authentication server for access to the first account, wherein the first policy component requires a first type of credential for access;

    establishing, by the user management server, a second policy component of an authentication server for access to the second account, wherein the second policy component requires a second type of credential for access;

    capturing, by the user management server, the first type of credential and the second type of credential;

    storing, by the user management component, the first type of credential as the first policy component with the GUID in a database;

    storing, by the user management component, the second type of credential as the second policy component with the GUID in the database;

    providing, by the user management component, access to the first account of the user when receiving input of the GUID and the first type of credential; and

    providing, by the user management server, access to the second account of the user when receiving input of the GUID and second type of credential,wherein the first type of credential comprises a first level of protection and the second type of credential requires a second level of protection, the second level of protection requiring the first type of credential and the second type of credential; and

    wherein the first level of protection is defined by the first policy component and the second level or protection is defined by the second policy component.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×