发明名称 CONTROL OF ACCESS TO A SECONDARY SYSTEM
摘要 A method for controlling access of a user to a secondary system. A primary system receives, from a user system connected to the secondary system, first authentication information comprising an encryption of a random string. The encryption of the random string is a user-specific key. Second authentication information is generated from protected secondary authentication data stored in the primary system. Generation of the second authentication information includes applying the user-specific key to the protected secondary authentication data to generate the second authentication information. The second authentication information is provided to the secondary system to enable access of the user to the secondary system.
申请公布号 US2015222608(A1) 申请公布日期 2015.08.06
申请号 US201514684977 申请日期 2015.04.13
申请人 International Business Machines Corporation 发明人 Feil Stephan
分类号 H04L29/06 主分类号 H04L29/06
代理机构 代理人
主权项 1. A method for controlling access of a user to a secondary system, said method comprising: a processor of a primary system receiving, from a user system connected to the secondary system, first authentication information comprising an encryption of a random string, said encryption of the random string being a user-specific key; said processor generating second authentication information from protected secondary authentication data stored in the primary system, said generating the second authentication information comprising applying the user-specific key to the protected secondary authentication data to generate the second authentication information; and said processor providing the second authentication information to the secondary system to enable access of the user to the secondary system.
地址 Armonk NY US
您可能感兴趣的专利