发明名称 |
CONTROL OF ACCESS TO A SECONDARY SYSTEM |
摘要 |
A method for controlling access of a user to a secondary system. A primary system receives, from a user system connected to the secondary system, first authentication information comprising an encryption of a random string. The encryption of the random string is a user-specific key. Second authentication information is generated from protected secondary authentication data stored in the primary system. Generation of the second authentication information includes applying the user-specific key to the protected secondary authentication data to generate the second authentication information. The second authentication information is provided to the secondary system to enable access of the user to the secondary system. |
申请公布号 |
US2015222608(A1) |
申请公布日期 |
2015.08.06 |
申请号 |
US201514684977 |
申请日期 |
2015.04.13 |
申请人 |
International Business Machines Corporation |
发明人 |
Feil Stephan |
分类号 |
H04L29/06 |
主分类号 |
H04L29/06 |
代理机构 |
|
代理人 |
|
主权项 |
1. A method for controlling access of a user to a secondary system, said method comprising:
a processor of a primary system receiving, from a user system connected to the secondary system, first authentication information comprising an encryption of a random string, said encryption of the random string being a user-specific key; said processor generating second authentication information from protected secondary authentication data stored in the primary system, said generating the second authentication information comprising applying the user-specific key to the protected secondary authentication data to generate the second authentication information; and said processor providing the second authentication information to the secondary system to enable access of the user to the secondary system. |
地址 |
Armonk NY US |