发明名称 Authenticating a response to a change request
摘要 A method to authenticate an identity of a responder. The method includes receiving a request and determining, by one or more computer processors, a reviewer for the request. A custom key is generated for the reviewer and the request, and at least one URL is generated that contains the custom key. At least one URL is sent, along with the request, to the reviewer. Upon receiving a response to the request that includes a selection of one URL, it is determined whether the response was received from the determined reviewer for the request.
申请公布号 US9424543(B2) 申请公布日期 2016.08.23
申请号 US201213628176 申请日期 2012.09.27
申请人 International Business Machines Corporation 发明人 Anderson Eric;Dawson Christopher J.;Kosaraju Ravi K.;Radhakrishnan Rajesh
分类号 G06Q10/00;G06F21/00;G06Q10/06;G06F21/62;G06F21/31;G06F21/44 主分类号 G06Q10/00
代理机构 代理人 Carpenter Maeve
主权项 1. A method executable by a central processing unit (CPU) for authenticating an identity of a reviewer to improve security and authentication when operating over a network to perform a change management task, the method comprising the steps of: receiving, by one or more computer processors, a request for a change to a project in a change management system; determining, by the one or more computer processors, at least one reviewer for the request; generating, by the one or more computer processors, a custom key for the at least one reviewer and the request, wherein the custom key includes one or more unique identifiers for the at least one reviewer; generating, by the one or more computer processors, at least two Uniform Resource Locators (URLs) embedded with both the custom key for the at least one reviewer and a change request number for the request, wherein the at least two URLs include an approval URL and a rejection URL; sending, by the one or more computer processors, the at least two URLs and a plurality of change request details for the request to the at least one reviewer; receiving, by the one or more computer processors, a response to the request, wherein the response includes a selection of one of the at least two URLs; determining, by the one or more computer processors, the response was received from the at least one reviewer determined for the request, wherein determining the response was received from the reviewer determined for the request includes: determining, by the one or more computer processors, whether a selected URL in the received response contains a custom key matching the custom key generated for the at least one reviewer and the request; andresponsive to a determination that the selected URL in the received response contains a custom key matching the custom key generated for the at least one reviewer and the request, determining, by the one or more computer processors, the response was received from at least one pre-authorized computing device of the at least one reviewer, wherein determining the response was received from the at least one pre-authorized computing device of the at least one reviewer includes: requesting, by the one or more computer processors, an authentication file for verification of the at least one pre-authorized computing device of the at least one reviewer, wherein the authentication file is an encrypted browser cookie;creating, by the one or more computer processors, the authentication file on the at least one pre-authorized computing device when the at least one reviewer logs into the at least one pre-authorized computing device;storing, by the one or more computer processors, the authentication file on the at least one pre-authorized computing device of the at least one reviewer; anddetermining, by the one or more computer processors, whether the authentication file from the at least one pre-authorized computing device is associated with the at least one reviewer; responsive to a determination that the authentication file received from the at least one pre-authorized computing device is not associated with the at least one reviewer, denying, by the one or more computer processors, the request, wherein denying includes rejecting processing of the change to the project and removing the custom key in the at least two URLs sent to the at least one pre-authorized computing device of the at least one reviewer from the change management system; and responsive to a determination that the authentication file received from the at least one pre-authorized computing device is associated with the at least one reviewer, accepting, by the one or more computer processors, the request, wherein accepting includes approving processing of the change to the project and removing the custom key in the at least two URLs sent to the at least one pre-authorized computing device of the at least one reviewer from the change management system.
地址 Armonk NY US