WO1999056194A2 - Systeme et procede d'authentification d'un utilisateur aupres de plusieurs serveurs dans un reseau d'informatique repartie - Google Patents
Systeme et procede d'authentification d'un utilisateur aupres de plusieurs serveurs dans un reseau d'informatique repartie Download PDFInfo
- Publication number
- WO1999056194A2 WO1999056194A2 PCT/US1999/009441 US9909441W WO9956194A2 WO 1999056194 A2 WO1999056194 A2 WO 1999056194A2 US 9909441 W US9909441 W US 9909441W WO 9956194 A2 WO9956194 A2 WO 9956194A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- server
- user
- client
- data
- data identifying
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
Definitions
- the Internet is a distributed computer network that permits multiple servers and clients to communicate with each other. Servers and clients communicate according to a predefined communications protocol.
- the protocol is Hypertext Transport Protocol (“HTTP”) running over a Transmission Control
- TCP/IP Protocol/Internetworking Protocol
- IP Internet Protocol
- a server is an application program running on a computer for making data, files, documents, web pages, and/or other resources (collectively, “resources”) stored within the computer available to clients requesting access to such resources.
- resources may contain sensitive or restricted information.
- these restricted resources are only provided to users of a client that are authenticated by the server storing such resources.
- the server upon receiving a request to access a restricted resource, the server prompts the user of the client requesting access to provide authentication data, for example, an identification code ("User ID”) and a password, back to the server.
- authentication data for example, an identification code ("User ID") and a password
- a user operating the client responds to the prompt by entering his or her authentication data and causes this data to be transmitted to the server.
- the server When the server receives the authentication data, it determines whether such data matches data stored in a record for the user in an account database residing on the server. The server grants the user access to the restricted resource if the authentication data matches the data stored in the record and the user has been given access privileges to the restricted resource. When access is granted, the server transmits the requested restricted resource to the client, which may display it to the user on a monitor. If the authentication data does not match the data stored in the record, then the server denies the user access to the restricted resource.
- United States Patent No. 5,708,780 to Levergood et al. describes a typical authentication process in more detail.
- state data typically includes data that identifies the client, data that identifies the server, data that identifies the session (e.g., the restricted resource(s) accessed, the time of such access, the time that the user was authenticated) and the authentication data of the user (e.g., a User ID and password).
- the client transmits a request for access to the restricted resource which includes the state data.
- the server Because the server receives the state data, it determines that the user of the client has already been authenticated, which eliminates the need for repetition of the authentication process. It is well known for enterprises to use servers to provide numerous unrestricted and restricted resources to users. The data representing the resources is often very large, and in such cases, it is distributed across multiple servers that communicate in a distributed computing network. For example, consider a scenario in which the data resides on two or more servers connected via a distributed computer network (e.g., the Internet). If a client attempts to access a restricted resource stored on one of the servers, then that server will authenticate the user prior to providing access to the restricted resource. If the authentication is successful, then the server will permit the user to access the requested resource.
- a distributed computer network e.g., the Internet
- FIG. 1 is an overview of an environment in which an embodiment of the present invention may be used.
- FIG. 2 is a block diagram of an embodiment of a server within a distributed computing network.
- FIG. 3 is a flowchart illustrating an embodiment of a process for authenticating a user of a client to multiple servers within a distributed computing network.
- FIGS. 4 is a flowchart illustrating an alternate embodiment of a process for authenticating a user of a client to multiple servers within a distributed computing network.
- One aspect of the present invention is directed to a method for a server to facilitate authentication of a user of a client by a second server.
- the server, the second server, and the client communicate in a distributed computing network.
- the server and the second server store a plurality of restricted resources.
- the method includes the steps of storing data identifying the second server in the server, receiving a request to access one of the plurality of restricted resources from the client, and transmitting the data identifying the second server to the client so that the user of the client can be authenticated by the second server.
- Another aspect of the present invention is directed toward a server for facilitating authentication of a user of a client by a second server.
- the server, the second server, and the client communicate in a distributed computing network.
- the server and the second server store a plurality of restricted resources.
- the server includes a memory storing data identifying the second server and a processor in communication with the memory.
- the processor is operative to receive a request to access one of the plurality of restricted resources from the client and transmit the data identifying the second server to the client so that the user of the client can be authenticated by the second server.
- Yet another aspect of the present invention is directed toward a method for a server to facilitate authentication of a user of a client by a second server.
- the server, the second server, and the client communicate in a distributed computing network.
- the method includes the steps of storing first data identifying the user and data identifying the . second server, receiving second data identifying the user, determining whether the second data corresponds to the first data, and when the second data corresponds to the first data, transmitting third data identifying the user to the second server based on the data identifying the second server so that the second server can authenticate the user.
- Still another aspect of the present invention is directed to a system for facilitating authentication of a user of a client by a first server and a second server.
- the server, the second server, and the client communicate in a distributed computing network.
- the first server and the second server store a plurality of restricted resources.
- the system includes a first memory associated with the first server storing data identifying the second server and first data identifying the user, and a first processor associated with the first server in communication with the first memory.
- the first processor is operative to receive a request to access one of the plurality of restricted resources from the client and transmit the data identifying the second server to the client.
- the system further includes a second memory associated with the second server storing second data identifying the user and a second processor associated with the second server in communication with the second memory.
- the second processor is programmed to receive third data identifying the user from the client, determine whether the second data corresponds to the third data, and authenticate the user when the second data corresponds the third data.
- the present invention provides a novel and unique method and system in which a user of a client submits authentication data to one server in a distributed computing network in order to access a restricted resource, yet the user is also authenticated by other servers in the network.
- the method and system serves to eliminate the repetitive, tedious, and burdensome requirement that the user provide authentication data to each server in a distributed computing network from which it requests access to a restricted resource.
- FIG. 1 shows an overview of an environment in which an embodiment of the present invention may be used.
- the environment includes a network 110, clients ⁇ OOQ)-IOO(N), and servers 120(1)-120(M).
- the variables "N” and “M” represent the numbers of clients and servers, respectively within the environment.
- the variables "M” is greater or equal to two and the variable "N” is at least one.
- Network 110 is a distributed computing network that enables communication between clients 100 and servers 120.
- network 110 may be the Internet, an intranet, a local area network (LAN), or a wide area network (WAN).
- network 110 is the Internet.
- Clients 100 are devices that are able to communicate with at least two of servers 120 via network 110.
- a client 100 may be a conventional desktop personal computer or a workstation running software that enables communication with servers 120.
- a client 100 may be a cellular telephone, telephone, pager, and/or other personal-type device running appropriate software that enables communication with servers 120.
- Clients 100(1)-100(N) communicate with network 110 via communication channels 160(1)-160(N), respectively.
- the communication channels 160 are well known and therefore are not further described here.
- each client 100 has a unique network address.
- network 110 is the Internet
- the unique network address for each client 100 is an IP address.
- Each client 100 has one or more users associated with it. A user may use a client 100 to access resources stored on one or more of servers 120.
- Each client 100 includes a memory that stores software that may be used for accessing resources residing on servers 120.
- the software is a Web browser that uses the HTTP communication protocol to communicate with servers 120 in order to access resources stored thereon.
- Web browser software is capable of transmitting requests to access resources ("access requests") that are stored on servers 120 and storing state data (e.g., in the form of a cookie) on a client 100 on which it is running.
- access requests requests to access resources
- state data e.g., in the form of a cookie
- An access request includes data identifying the requested resource, and may include state data stored on the client 100, if any.
- Servers 120 are devices that are able to communicate with clients 100 via network 110.
- Servers 120(1)-120(M) communicate with network 110 via communication channels 170(1)-170(M), respectively.
- the communication channels 170 are well known and therefore are not further described here.
- each server 120 has a unique network address, for example, an IP address when the network is the Internet.
- servers 120 are Web (HTTP) servers.
- Servers 120 store resources, which are accessed by clients 100 over network 110. For example, resources include any data, files, documents, web pages, and/or other resources residing on servers 120.
- a resource will be referred to as "restricted” if a user of a client must be authenticated before such user is permitted access to the resource.
- a resource will be referred to as “unrestricted” if a user of a client need not be authenticated before such user is permitted access to the resource.
- Servers 120 also store other software and databases as will be described in more detail below.
- One such software program is for authenticating users of clients 100 to determine whether they should be granted access to a restricted resource residing on servers 120.
- FIG. 2 depicts an exemplary embodiment of a server 120.
- This exemplary server 120 includes a memory 127 and at least one processor 125 in communication with memory 127.
- each server 120 shares a similar architecture.
- Memory 127 typically includes one or more machine readable media.
- machine readable media include, as is well known in the art, an appropriate combination of magnetic, semiconductor and optical media such as a hard disk, optical disk, floppy disk, tape, RAM, ROM, and/or WORM.
- Memory 127 includes a user database 127A, a server database 127B, a session database 127C, and program code 127D. These are now each described in more detail.
- User database 127A stores data identifying users of clients 100. For the purpose of simplicity, the description that follows is provided with respect to one such user of a client 100.
- user database 127 A stores authentication data in the form of an alphanumeric user identifier ("User ID") and a password for each user.
- user database 127 A may also include data identifying resources to which a user has access and the last time that the user accessed such resources.
- Server database 127B stores data that identifies servers 120 in the network 110.
- server database 127B includes a network address (e.g., an IP address) for each server 120.
- server database 127B includes a Uniform Resource Locator (URL) for each such server.
- server database 127B may include both a network address and a URL for servers 120.
- Session database 127C stores data identifying resources accessed by clients 100.
- session database 127C includes data that identifies a resource accessed by a client 100 and the time that the resource was accessed.
- session database 127C of a server 120 may also store a time that the user of the client 100 was authenticated by the server 120.
- the data stored in session database 127C is transient ⁇ that is, it is removed by the server at predetermined times.
- Program code 127D includes software for controlling processor 125 in accordance with the flowcharts of FIGS. 3 and 4.
- FIG. 3 is a flow chart illustrating an embodiment of a process for authenticating a user of a client 100 to multiple servers 120 within network 110.
- a user of a client 100 causes the client 100 to transmit a request to one of servers 120 for access to a restricted resource residing thereon.
- the client 100(1) transmits the access request to server 120(1).
- the access request is transmitted over the Internet and includes data identifying the requested restricted resource and data identifying the client. It may also include the version of the browser software that the client 100(1) is running and the version of the HTTP protocol that the client 100(1) is running.
- the access request will also include state data that has been stored on the client 100(1).
- the state data includes data that identifies the client 100(1) (e.g., IP address of the client 100(1)), data that identifies the server 120(1) (e.g., an IP address of the server 120(1)), data that identifies the session (e.g., the resources accessed, the time of such accesses, the time that the user was authenticated) and authentication data (e.g., a User ID and password).
- the state data may also include an expiration period of the state data to prevent unnecessary use of the client's 100(1) storage capacity.
- the server 120(1) determines if the access request of the user of the client 100(1) includes state data. This is done in a well known manner. If the access request transmitted by the client 100(1) is determined to include the state data, the server 120(1) proceeds to step 357. If the access request is determined not to include the state data, then the server 120(1) proceeds to step 360.
- the server 120(1) determines if the session is valid. To accomplish this, the server determines if the authentication data and session data included in the state data have corresponding matches in the user database 127A and session database 127C, respectively, of server 120(1). If corresponding matches are found, then the session is valid for the client 100(1), and the server 120(1) proceeds to step 385. If corresponding matches are not found, then the session is not valid for the client 100(1), and the server 120(1) proceeds to step 360. In one embodiment, at step 357, if the session is valid, the server 120(1) updates the state data on the client 100(1) and the data identifying the session in its session database 127C.
- the server 120(1) transmits an authentication request that prompts the user of the client 100(1) for authentication data.
- Server 120(1) also transmits data identifying the servers 120 on the network 110 to the client 100(1).
- the data identifying the servers 120 is the IP addresses of the servers 120 and the authentication data is a User ID and a password.
- the authentication request transmitted by the server 120(1) contains code for the client 100(1) to execute. This code may be in JavaScript or VBScript standard format, or some other format.
- the client 100(1) transmits the user's authentication data to other servers 120(2)-120(M) identified by the data received at step 360 from server 120(1).
- the client 100(1) executes the code contained in the authentication request (received at step 360) so as to initiate an authentication process with the servers 120(2)-120(M) on the network 110.
- server 120(2) which receives an authentication request from the client 100(1).
- the other servers 120(3)-120(M) would authenticate the user in a similar manner.
- client 100(1) submits the user's authentication data to server 120(2) in the form of a User ID and a password.
- server 120(2) authenticates the user of the client 100(1).
- the specific type of authentication processes is not critical to the present invention, as long as it enables a server 120 to verify that the user of the client 100(1) is authorized to receive a requested restricted resource.
- the authentication process includes server 120(2) comparing the user's authentication data transmitted by client 100(1) at step 365 to the data stored in the user database 127A of server 120(2).
- server 120(2) compares such User ID and password to the User IDs and passwords stored in user database 127A of the server 120(2). If the authentication data has a corresponding entry in the data stored in the user database 127A, then the server 120(2) generates state data (e.g., in the form of a cookie). The server 120(2) transmits the state data (as described above) to the client 100(1) for storage thereon. Server 120(2) also creates and stores corresponding session data in its session database 127C.
- state data e.g., in the form of a cookie
- Client 100(1) continues transmitting authentication requests to each of the other servers 120(3)-120(M) identified by the data provided to the client 100(1) by server 120(1) at step 360 so as to be authenticated by those servers.
- a server 120(2)-120(M) does not respond to an authentication request of client 100(1) within a predefined time period, then a time out mechanism will trigger the process to continue without authentication occurring at that server.
- client 100(1) will receive notice and proceed to continue the process with another server until each server identified by the data received at step 360 is exhausted. As is readily apparent, not all servers 120(1)-120(M) need to successfully authenticate the user of client 100(1).
- client 100(1) transmits the user's authentication data to server 120(1) via the network 110.
- server 120(1) authenticates the user as described above at step 370. If the transmitted authentication data has a match in the user database 127A, then processing proceeds to step 380. If the transmitted authentication data does not have a match in the user database 127A, then the user is not valid, server 120(1) denies the user access to the requested resource at step 358, and the process ends at step 390. In this latter case, the user would be denied access to a restricted resource on server 120(1), yet might be given access to other restricted resources residing on servers 120(2)-120(M).
- server 120(1) At step 380, server 120(1) generates state data (e.g. , in the form of a cookie) and transmits it to the client 100(1) for storage. Server 120(1) also creates and stores corresponding session data in its session database 127C.
- state data e.g. , in the form of a cookie
- server 120(1) grants the user access to the requested restricted resource.
- the restricted resource is a data file that the server 120(1) transmits to the client 100(1) via the network 110.
- the process ends. After a user of the client 100(1) is authenticated by one or more servers
- FIG. 4 is a flow chart illustrating an alternative process for authenticating a user of a client 100 to multiple servers 120 within a distributed computing network 110.
- Steps 405, 410, 412 and 415 are executed as described above in FIG. 3 at steps 350, 355, 357 and 360, respectively.
- step 412 if the session is valid for the client 100(1), then the server 120(1) updates the state data on the client 100(1) and the data identifying the session in its session database 127C in memory 127 and proceeds to step 425.
- server 120(1) prompts the user of the client 100(1) for authentication data as described above in FIG. 3 at step 360.
- the client 100(1) transmits the user's authentication data to server 120(1).
- server 120(1) determines whether the transmitted authentication data is sufficient to authenticate the user as described above in FIG. 3 at step 377. If the user is not authenticated, server 120(1) denies access to the requested restricted resource, server 120(1) denies the user access to the requested resource at step 421, and the process ends at step 475. If the user is authenticated, the server 120(1) proceeds to step 425.
- the server 120(1) At step 425, the server 120(1) generates state data (e.g., in the form of a cookie) and transmits the state data to the client 100(1) for storage.
- server 120(1) grants the user access to the requested restricted resource as described above in FIG. 3 at step 385.
- processor 125 of server 120(1) also generates data identifying the session and stores it as part of session database 127C.
- server 120(1) retrieves data identifying servers 120(2)- 120(M). In one embodiment, server 120(1) retrieves the IP addresses of servers 120(2)- 120(M) that are stored as part of server database 127B in memory 127.
- server 120(1) transmits the authentication data transmitted by - the user and data in session database 127C to the other servers 120(2)-120(M). In one embodiment, the server 120(1) transmits the authentication data of the user of the client 100(1) and session data generated at step 430.
- each server 120(2)- 120(M) authenticates the user of the client
- each of the servers 120 transmits corresponding state data to the client 100(1).
- the client 100(1) stores the state data, which will be sent to a server 120(2)-120(M) when the user makes a request to access a restricted resource residing thereon.
- the process ends.
- the inventors of course realize that the current HTTP protocol does not support a server initiating contact with a client; however, future modified versions of the HTTP protocol and/or other protocols may support such contact.
- the invention fulfills the substantial need which exists for a method and system wherein a user of a client is required to provide authentication data to one server in a distributed computing network, yet can be authenticated by multiple servers in the distributed computing network.
- the present invention eliminates the repetitive, tedious and burdensome task of the prior art user authentication process.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
Abstract
L'invention concerne un procédé et un système permettant à un serveur de faciliter l'authentification de l'utilisateur d'un client par un second serveur. Dans ce procédé, le serveur, le second serveur et le client communiquent dans un réseau d'informatique répartie et le serveur et le second serveur ont en mémoire une pluralité de ressources à accès limité. Le procédé comprend les étapes suivantes : mémorisation dans le serveur de données identifiant le second serveur, réception d'une demande d'accès à une des ressources comprise dans la pluralité de ressources à accès limité en provenance du client, et transmission au client de données identifiant le second serveur de manière à permettre l'authentification de l'utilisateur du second client par le second serveur.
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US8371498P | 1998-04-30 | 1998-04-30 | |
US60/083,714 | 1998-04-30 | ||
US28354099A | 1999-04-01 | 1999-04-01 | |
US09/283,540 | 1999-04-01 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO1999056194A2 true WO1999056194A2 (fr) | 1999-11-04 |
WO1999056194A3 WO1999056194A3 (fr) | 2000-01-13 |
Family
ID=26769631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US1999/009441 WO1999056194A2 (fr) | 1998-04-30 | 1999-04-29 | Systeme et procede d'authentification d'un utilisateur aupres de plusieurs serveurs dans un reseau d'informatique repartie |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO1999056194A2 (fr) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001055822A1 (fr) * | 2000-01-28 | 2001-08-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Systeme logon unique et procede de distribution d'applications logicielles |
GB2367725A (en) * | 2000-10-04 | 2002-04-10 | Cce Ltd | Client/server authentication |
GB2382281A (en) * | 2001-11-06 | 2003-05-21 | British Telecomm | Authentication or network users |
WO2003091861A3 (fr) * | 2002-04-26 | 2004-07-22 | Ibm | Systeme de gestion efficace de l'identite au moyen d'un navigateur, fournissant un controle personnel et l'anonymat |
GB2399435A (en) * | 2000-01-10 | 2004-09-15 | Sun Microsystems Inc | Using generic user name and password to generate a token to access a service. |
US7020456B2 (en) | 2000-12-08 | 2006-03-28 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for authentication of units in a communications network |
US7464402B2 (en) | 2003-03-17 | 2008-12-09 | British Telecommunications Public Limited Company | Authentication of network users |
US7694329B2 (en) | 2001-08-03 | 2010-04-06 | International Business Machines Corporation | Secure delegation using public key authentication |
US7992195B2 (en) | 2003-03-26 | 2011-08-02 | International Business Machines Corporation | Efficient browser-based identity management providing personal control and anonymity |
US10069831B2 (en) | 2014-11-05 | 2018-09-04 | Visa International Service Association | Using third party information to improve predictive strength for authentications |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0573248A1 (fr) * | 1992-06-02 | 1993-12-08 | Hughes Aircraft Company | Moyens et méthodes d'entrée en une fois pour systèmes distribués d'ordinateur |
EP0773489A1 (fr) * | 1995-11-13 | 1997-05-14 | International Business Machines Corporation | Serveur de système de réseau |
US5708780A (en) * | 1995-06-07 | 1998-01-13 | Open Market, Inc. | Internet server access control and monitoring systems |
-
1999
- 1999-04-29 WO PCT/US1999/009441 patent/WO1999056194A2/fr active Search and Examination
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0573248A1 (fr) * | 1992-06-02 | 1993-12-08 | Hughes Aircraft Company | Moyens et méthodes d'entrée en une fois pour systèmes distribués d'ordinateur |
US5708780A (en) * | 1995-06-07 | 1998-01-13 | Open Market, Inc. | Internet server access control and monitoring systems |
EP0773489A1 (fr) * | 1995-11-13 | 1997-05-14 | International Business Machines Corporation | Serveur de système de réseau |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2399435A (en) * | 2000-01-10 | 2004-09-15 | Sun Microsystems Inc | Using generic user name and password to generate a token to access a service. |
WO2001055822A1 (fr) * | 2000-01-28 | 2001-08-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Systeme logon unique et procede de distribution d'applications logicielles |
GB2367725A (en) * | 2000-10-04 | 2002-04-10 | Cce Ltd | Client/server authentication |
US7020456B2 (en) | 2000-12-08 | 2006-03-28 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for authentication of units in a communications network |
US7698736B2 (en) | 2001-08-03 | 2010-04-13 | International Business Machines Corporation | Secure delegation using public key authentication |
US7694329B2 (en) | 2001-08-03 | 2010-04-06 | International Business Machines Corporation | Secure delegation using public key authentication |
GB2382281B (en) * | 2001-11-06 | 2005-03-30 | British Telecomm | Authentication of network users |
GB2382281A (en) * | 2001-11-06 | 2003-05-21 | British Telecomm | Authentication or network users |
WO2003091861A3 (fr) * | 2002-04-26 | 2004-07-22 | Ibm | Systeme de gestion efficace de l'identite au moyen d'un navigateur, fournissant un controle personnel et l'anonymat |
US9501634B2 (en) | 2002-04-26 | 2016-11-22 | International Business Machines Corporation | Efficient browser-based identity management providing personal control and anonymity |
US10425396B2 (en) | 2002-04-26 | 2019-09-24 | International Business Machines Corporation | Efficient browser-based identity management providing personal control and anonymity |
US7464402B2 (en) | 2003-03-17 | 2008-12-09 | British Telecommunications Public Limited Company | Authentication of network users |
US7992195B2 (en) | 2003-03-26 | 2011-08-02 | International Business Machines Corporation | Efficient browser-based identity management providing personal control and anonymity |
US10069831B2 (en) | 2014-11-05 | 2018-09-04 | Visa International Service Association | Using third party information to improve predictive strength for authentications |
US10911455B2 (en) | 2014-11-05 | 2021-02-02 | Visa International Service Association | Using third party information to improve predictive strength for authentications |
Also Published As
Publication number | Publication date |
---|---|
WO1999056194A3 (fr) | 2000-01-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7418502B2 (en) | Authenticating user access request with an authentication server for accessing a network server without communicating user authentication cookie to the network server | |
US6049877A (en) | Systems, methods and computer program products for authorizing common gateway interface application requests | |
US20030093699A1 (en) | Graphical passwords for use in a data processing network | |
US7590731B2 (en) | Accessing a server using a user authentication indicator | |
US7296077B2 (en) | Method and system for web-based switch-user operation | |
EP1454470B1 (fr) | Systeme et procede d'authentification d'utilisateurs de reseau | |
KR100946110B1 (ko) | 기존 ssl 세션을 브레이킹하지 않고 인증서-기반 인증으로 스텝 업하는 방법 및 시스템 | |
EP1427160B1 (fr) | Méthodes et systèmes d'autentification d'un utilisateur pour des sous-locations d'une location dans un réseau | |
US5875296A (en) | Distributed file system web server user authentication with cookies | |
US7987501B2 (en) | System and method for single session sign-on | |
US6338064B1 (en) | Method for enabling a web server running a “closed” native operating system to impersonate a user of a web client to obtain a protected file | |
EP1654852B1 (fr) | Systeme et procede d'authentification de clients dans un environnement client-serveur | |
US7506055B2 (en) | System and method for filtering of web-based content stored on a proxy cache server | |
US5848412A (en) | User controlled browser identification disclosing mechanism | |
US7281139B2 (en) | Authenticating legacy service via web technology | |
AU2001280975B2 (en) | Systems and methods for authenticating a user to a web server | |
US20040168090A1 (en) | System and method for delegating a user authentication process for a networked application to an authentication agent | |
US20040123144A1 (en) | Method and system for authentication using forms-based single-sign-on operations | |
EP1081914A2 (fr) | Enregistrement unique dans un réseau qui contient plusieurs ressources à accès limité controllées séparement | |
US20050154887A1 (en) | System and method for secure network state management and single sign-on | |
WO1999056194A2 (fr) | Systeme et procede d'authentification d'un utilisateur aupres de plusieurs serveurs dans un reseau d'informatique repartie | |
US6611916B1 (en) | Method of authenticating membership for providing access to a secure environment by authenticating membership to an associated secure environment | |
US20050055555A1 (en) | Single sign-on authentication system | |
JP2001056795A (ja) | アクセス認証処理装置及びこれを備えるネットワーク及びその記憶媒体及びアクセス認証処理方法 | |
WO2001052025A2 (fr) | Partage de noms d'utilisateur entre des services multiples |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): CN IN JP RU |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): CN IN JP RU |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) |