摘要:
A system and method of establishing a resource provider as a trusted listing are disclosed. The method includes receiving, by a directory server computer, an indication from a user that a resource provider is trusted. The directory server computer is programmed to provide a first level of authentication. The method then includes storing, in a database, data representing the indication from the user that the resource provider is trusted. The method then includes receiving an authentication request message from the user conducting an interaction at the resource provider computer and determining that the data representing the indication from the user that the resource provider is trusted is present. In response to determining, the method includes providing a second level of authentication to the user before the user is allowed to complete the interaction. The second level of authentication is lower than the first level.
摘要:
An apparatus and method are provided for predictive token validation. In use, a database stores service usage information relating to usage of at least one service hosted by at least one server. Before at least one request for service is received from a user at the at least one server, the service usage information in the database is accessed. Further, based on the service usage information, a token associated with the user is sent to the at least one server for being validated by the at least one server, such that the at least one server allows access to the at least one service by the user, in response to the at least one request for service being received from the user with an identifier that is different from the token.
摘要:
An image forming apparatus includes: an internal authentication information storage unit that stores user authentication information relating to authentication for the image forming apparatus; an internal user authentication unit; an external authentication information storage unit that stores the user authentication information for external authentication, and a private IP address in association with one another for a plurality of URLs for external authentication; and a pseudo single sign-on unit that when it is determined that a redirection destination URL included in a response message transferred from a cloud server matches one of the stored plurality of URLs for external authentication, reads the user identification information for external authentication relating to the private IP address corresponding to a destination IP address included in a packet of the response message from the external authentication information storage unit, transmits the information for external authentication to the redirection destination URL, and performs the sign-on process.
摘要:
A system and method for protecting access to authentication systems. A mediator may accept original authentication credentials from a client, may process the authentication credentials to provide processed authentication credentials and may forward the processed authentication credentials to an authentication system. Processing original authentication credentials may include encrypting at least one portion of original authentication credentials.
摘要:
The claimed subject matter includes techniques for detecting anomalous accounts. An example method includes receiving, via a processor, a list of monitored machines and event logs including logons for the list of monitored machines for a predetermined window of time. The example method also includes generating, via the processor, a baseline based on the event logs for the predetermined window of time. The example method also includes collecting, via the processor, daily logon events after the predetermined time and comparing the daily logon events to the baseline. The method further includes detecting, via the processor, an anomalous account based on a difference of logon events of the anomalous account from the baseline. The method also includes displaying, via the processor, the detected anomalous account.
摘要:
Facilitating single sign-on on a device having sandboxed applications. A method includes identifying a plurality of associated applications. Criteria are evaluated to identify a primary application. Authentication state is stored at the primary application. One or more portions of the authentication state can be used by the applications in the plurality of associated application for authentication.
摘要:
A login request initiated by a user at a current page is received. Whether there exists an account record matched with a login account name and login password combination in the login request is searched from an account table of the current page. If a result is positive, the user is allowed to log in. If a result is not positive, a preconfigured account name collection corresponding to the login account name is acquired. The account name collection includes login account names of the user's registered accounts in a plurality of member systems. A login account name in a member system to which the current page belongs is searched from the account name collection, and the found login account name is provided to the user. The techniques of the present disclosure prompts a correct login account name to the user, especially when there are many user login account names, thereby reducing memory burden of the user and assisting the user in implementing a quick login under multi-account management.
摘要:
Systems and methods are disclosed in which a client device is in communication via a network with a server and a common gateway interface. A native app executes on one or more hardware processors of the client device to receive a device session token from the server for authenticating a device session between the native app and the server, the device session token including credentials authenticating a user for a device session between the server and the native app executing on the client device. An embedded web browser executes on one or more hardware processors of the client device. The native app invokes the embedded web browser and the native app passes the device session token to the embedded web browser for authentication of a web session between the embedded web browser and the common gateway interface that continues the device session authentication without requiring additional authentication. The embedded web browser passes the device session token to the common gateway interface and receives from the common gateway interface a web flow authorization token, converted from the device session token using the credentials for authenticating the user for the device session between the server and the native app executing on the client device, for authenticating the web session as a continuation of the device session authenticated by the device session token so that the web flow authorization token and the device session token both share the same underlying device session and the device session remains active while the web session is active.
摘要:
A request is made by a client to be authenticated by a first cloud storage server that may be associated with a first service provider. An identity federation request is sent from the client to the first cloud storage server, wherein the identity federation request seeks to federate a user account of the client on the first cloud storage server with a user account of the client on a second cloud storage server that may be associated with a second service provider. The client is redirected from the first cloud storage server to the second cloud storage server. A request is made by the client to be authenticated by the second cloud storage server such that the second cloud storage server, once the client is authenticated, maps the user account on the first cloud storage server with the user account of the second cloud storage server and establishes identity federation there between.