WO2001052025A2 - Accessing multiple services with a unique user name - Google Patents
Accessing multiple services with a unique user name Download PDFInfo
- Publication number
- WO2001052025A2 WO2001052025A2 PCT/US2001/000249 US0100249W WO0152025A2 WO 2001052025 A2 WO2001052025 A2 WO 2001052025A2 US 0100249 W US0100249 W US 0100249W WO 0152025 A2 WO0152025 A2 WO 0152025A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- password
- service
- access
- generic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Definitions
- the present invention relates generally to services that are accessible via networks and more particularly to the sharing of user names across multiple services.
- a wide variety of services are available on telecommunications networks or computer networks, such as the Internet.
- the services may be accessed by a large number of users, and a single user may wish to access a number of different services.
- Many of the services require the user to provide a user name and password to access the service.
- a desired user name is already taken. For example, a user named Joe Smith may not be able to use "joesmith" as a user name because another Joe Smith is already assigned that user name.
- the user may be required to keep track of multiple respective user name/password pairs for respective services. This is quite cumbersome and may result in a user providing the wrong user name/password for a given service.
- the present invention addresses the above-described limitation of conventional systems by allowing a user to use a common user name across multiple services.
- the user is permitted to use a user name that is currently assigned to a different user.
- the password assigned to the user must differ from the password assigned to the other user that shares the user name.
- an intermediary is provided between a user and a service provider to translate the user name and password selected by the user into a unique value that is acceptable to the service provider.
- These approaches differ from approaches, such as Microsoft Passport, where a user name and password pair are stored in a profile and the profile is accessed to retrieve the pair for participating services.
- an access regulating facility for regulating access to a service via a network.
- the facility requires a valid user identification and a valid password from a user before the user is granted access to the service.
- a request is received from a first user to have a selected user identification and a selected password assigned to the first user. This user identification is already assigned to a second user. However, the selected password is not currently assigned to any other user.
- the request is granted by assigning the selected user identification and the selected password to the first user for use in gaining access to the service via the access regulating facility.
- a generic user name and a generic password are provided for a user.
- a request is received at a computer system to establish a user name and password for the user at a service.
- An identifying token is generated for the user by manipulating the generic user name and the generic password.
- the identifying token may be generated by calculating a hash function value from the generic user name.
- FIGURE 1 is a block diagram of a first alternative implementation for the illustrative embodiment.
- FIGURE 2 is a flow chart illustrating the steps that are performed in the first alternative implementation to assign a user a user ID and password.
- FIGURES 3 A and 3B illustrate a second alternative implementation of the illustrative embodiment.
- FIGURE 4 is a flow chart illustrating the steps that are performed in a second alternative implementation.
- FIGURE 5A illustrates an instance wherein an intermediary is implemented as an applet at the client.
- FIGURE 5B illustrates an example wherein the intermediary is implemented as a local proxy at the client.
- FIGURE 5C illustrates an example in which the intermediary is implemented as a plug in to a web browser at the client.
- FIGURE 6A illustrates an example where the intermediary is implemented as a proxy on the server.
- FIGURE 6B illustrates an example where the intermediary is implemented as a servlet on the server.
- FIGURE 6C illustrates an example wherein the intermediary is implemented by a script on the server.
- FIGURE 7 shows an example wherein the intermediary is implemented as a repository on a separate device.
- FIGURE 8 is a flow chart illustrating the steps that are performed in a second alternative implementation when the intermediary generates a unique user name/password pair.
- FIGURE 9 is a flow chart illustrating the steps that are performed in the second alternative implementation when the intermediary generates an identifying token.
- the illustrative embodiment allows a user to use a single user name across multiple services.
- the user name assigned to the user may be shared by other users that access the services.
- the user may be assigned a user name that is already assigned to another user for a service, but the user must be assigned a unique password for the service.
- Each service may have an access regulating facility that enforces these requirements.
- an intermediary is provided to translate a generic user name and a generic password provided by the user to unique values for the services which the user wishes to access.
- the services may be any of a number of different types of services.
- the services may be web services that are accessible via the Internet, an extranet or an intranet.
- the services may be provided by a single shared computer system, a mail server, an FTP server or another type of server.
- the network that provides communications between the user and the service may be a computer network, a telecommunications network or even a wireless network.
- a “service” is a customer-based or user- oriented function.
- a “client” is a user or other entity for which services are provided by a service provider.
- An “intermediary” is an entity that mediates and/or processes communications between a client and a service provider.
- FIG. 1 is a block diagram illustrating a first alternative implementation of the illustrative embodiment.
- a user 10 uses a client system 12 to attempt to access a service provided by a service provider 16.
- An access regulating facility 14 controls access to the service provided by the service provider 16.
- the connections between the user 10, access regulating facility 14 and service provider 16 may be local connections or network connections.
- the client system 12 may be a computer system or other type of electronic device that allows a user to gain access to the service provided by the service provider.
- the client may be a personal computer, a network computer, a personal digital assistant (PDA) or workstation.
- the client 12 may be an intelligent appliance, a pager or even an intelligent telephone.
- the client possesses storage capacity that may be implemented using a number of different types of storage technology, including read only memory (ROM), random access memory (RAM), secondary storage media, such as optical disks, magnetic disks or other types of storage technologies.
- ROM read only memory
- RAM random access memory
- secondary storage media such as
- the service provider 16 provides services via web pages, such as hypertext mark-up language (HTML) documents, extensible mark-up language (XML) documents, other mark-up language documents or other content.
- the client 12 includes a web browser 18 for receiving and interpreting such documents.
- the access regulating facility 14 controls access to the service provided by the service provider 16.
- the access regulating facility 14 requires a user to provide a user identification (ID) and a password before service is granted to the user.
- a table, database or other compilation of user IDs and passwords 19 is stored at the access regulating facility 14 or is stored remotely but is accessible to the access regulating facility.
- the access regulating facility 14 may be implemented in software as a software facility or in hardware.
- the service provider 16 may be a dedicated computer system, such as a server, that provides services or a process on a computer system that runs other processes.
- the service provider 16 may be, for example, a web server, FTP server, a mail server, a time-shared computer system, a server form, or a collection of services available by portal.
- FIG 2 is a flow chart illustrating the steps that are performed to assign a user ID and password in the first alternative implementation of the illustrative embodiment.
- the user chooses a desired user ID and password (step 30 in Figure 2).
- the phrase "user ID” and the phrase "user name” will be used interchangeably.
- the user ID 20 and password 22 are forwarded from the client 12 to the access regulating facility 14.
- the access regulating facility 14 compares the user ID 28 and password 22 with the other user IDs and passwords 19 that have already been assigned to other users.
- a determination is made whether there are any matching user ID/password pairs that match those provided by the user 10 via client 12 (step 32 in Figure 2).
- the prohibited passwords need not be limited strictly to those that are currently assigned but may also be restricted to those that have been assigned to users with like user IDs over a predetermined period of time (e.g. in the last six months). If there are no matching user ID/password pairs, the user ID 20 and password 22 selected by the user are assigned to the user by the access regulating facility 14 (step 34 in Figure 2). Response 24 advises the user of the acceptance of the user ID/password pair. The user 10 may subsequently use the assigned user ID and password to access the service provided by the service provider 16.
- step 32 in Figure 2 If, in contrast, there is a matching user ID/password pair (see step 32 in Figure 2) the user 10 is sent a response 24 that advises the user to select another password (step 36 in Figure 2). The user then chooses a new password that is forwarded via the client 12 to the access regulating facility 14 (step 38 in Figure 2). The process is repeated beginning at step 32 until a non-matching user ID/password pair is found.
- other passwords may be prohibited, such as passwords that are excessively short, easily guessed or those that meet other criteria.
- FIG 3 A illustrates an example of a second alternate implementation in which an intermediary is used to translate a user name and password into information that is unique to a service.
- a client 40 is used by a user 10 to attempt to gain access to a service provided by a server 44.
- the client 40 and the server 44 may be any of a number of different devices such as described above for the client 12 and service provider 16 described with reference to Figure 1.
- the user 10 chooses a generic user name 46 and a generic password 48 for use with all services.
- the client 40 forwards the generic user name 46 and generic password 48 to an intermediary 42 along with a server ID 50 that identifies the server 44 to which the user wishes to gain access.
- the server ID 50 may be, for example, a uniform resource locator (URL)
- the client 40 may also optionally forward a key generation token 52 that is used to generate a unique user name/password pair 54 such that two parties names "Joe Smith" with the same password accessing a service get a different username/password pair for the service.
- the token 52 is randomly chosen and influences the generation of the per service user/name password pairs.
- the intermediary 42 receives the generic user name 46, the generic password 48, the server ID 50 and, optionally, the key generation token 52.
- the intermediary 42 produces a unique user name/password pair 54 that is forwarded to the server 44 along with the password 56 so that the user 10 may gain access to the service provided by the server.
- the details of the process performed by the intermediary and the protocol will be set forth in more detail below.
- Figure 4 is a flow chart that provides an overview of the steps that are practiced with the second implementation to access a service.
- the user chooses a generic user ID and a generic password (step 64 in Figure 4).
- the generic user ID and the generic password are used to access multiple services by way of the intermediary 42 (step 66 in Figure 4).
- the intermediary 42 may take many different forms.
- the intermediary 42 may be implemented on the client 40, on the server 44 or on a separate dedicated repository device.
- the intermediary 42 may be implemented as an applet that runs on a web browser 70 on the client 40, as shown in Figure 5 A.
- the intermediary may be implemented as a local proxy 74 that interacts with the web browser 70 on the client 40, as shown in Figure 5B.
- Another alternative is for the intermediary to be a plug-in 76 to a web browser 70 at the client, as shown in Figure 5C.
- FIG. 5C Those skilled in the art will appreciate that other alternative implementation options are available for implementing the intermediary at the client.
- the intermediary may be implemented on the server 44 rather than on the client 40.
- the intermediary may be implemented as a proxy 80 at the server 44, as shown in Figure 6A.
- the intermediary may also be implemented as a servlet 82 at the server 44, as shown in Figure 6B.
- the intermediary 84 may be implemented as a script, such as a CGI -bin script, as shown in Figure 6C.
- the intermediary 92 may also be implemented on a repository 90.
- the repository 90 is a separate device that is distinct from the client 40 and the server 44.
- the repository 90 may be, for example, a computer system on which the intermediary 92 runs.
- Figure 8 illustrates a flow chart of the steps that are performed for the second alternative implementation as depicted in Figure 3 A.
- the user 10 registers a generic user name and a generic password with the intermediary 42 (step 100 in Figure 8).
- the user 10 may optionally provide a key generation token at the time of registration.
- the user 10 provides the generic user name 46 and generic password 48 to the intermediary 42 along with server ID 50 (step 104 in Figure 8).
- the intermediary generates a unique value 54 from the provided information (step 106 in Figure 8).
- the unique value 54 is forwarded along with a password 56 to the server 44 to access the service (step 108 in Figure 8).
- the unique value 54 may be generated by taking a hash of the generic user name 46 and the server ID 50.
- a suitable hash function is the MD5 hash function. Those skilled in the art will appreciate that a number of different hash functions may be utilized.
- the hash function value of the results may be converted into printable characters to form the user name/password pair 54.
- the output from the hash algorithm may be printed as hexadecimal digits. Alternatively, for every six bits of output, a single letter uu-encoded may be output.
- Figure 3B illustrates another case for the second alternative implementation where the intermediary 42 produces an identifying token 60 rather than the unique value 54.
- the identifying token 60 is passed without passing a password 48 in contrast to the case depicted in Figure 3A.
- Figure 9 is a flow chart illustrating the steps that are performed in such a case. Steps 100 and 104 are like those described above relative to Figure 8.
- the intermediary 42 generates an identifying token 60.
- This identifying token 60 is sent to the server 44 without the need for sending the password 48 to the server (step 112 in Figure 9).
- the identifying token 60 is created by taking the hash of the generic user name 36, the generic password 48, the server ID 50 and the key generation token 52. The resulting value is converted into printable characters to form the identifying token 60.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0217052A GB2375414B (en) | 2000-01-10 | 2001-01-04 | Sharing user names across multiple services |
| AU2001227601A AU2001227601A1 (en) | 2000-01-10 | 2001-01-04 | Sha ring user names across multiple services |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US48022200A | 2000-01-10 | 2000-01-10 | |
| US09/480,222 | 2000-01-10 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2001052025A2 true WO2001052025A2 (en) | 2001-07-19 |
| WO2001052025A3 WO2001052025A3 (en) | 2002-05-02 |
Family
ID=23907140
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2001/000249 Ceased WO2001052025A2 (en) | 2000-01-10 | 2001-01-04 | Accessing multiple services with a unique user name |
Country Status (3)
| Country | Link |
|---|---|
| AU (1) | AU2001227601A1 (en) |
| GB (1) | GB2375414B (en) |
| WO (1) | WO2001052025A2 (en) |
Cited By (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2440425A (en) * | 2006-07-25 | 2008-01-30 | Intuit Inc | Single sign-on system which translates authentication tokens |
| CN104917749A (en) * | 2015-04-15 | 2015-09-16 | 腾讯科技(深圳)有限公司 | Account registration method and device |
| WO2015171635A1 (en) * | 2014-05-06 | 2015-11-12 | Alibaba Group Holding Limited | Method, apparatus, and system for managing user accounts in the event of conflicting login names |
| US11947658B2 (en) | 2016-06-23 | 2024-04-02 | Mindyourpass Holding B.V. | Password generation device and password verification device |
| US20240171567A1 (en) * | 2022-11-17 | 2024-05-23 | Dell Products L.P. | Per-server customized access credentials |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0398645B1 (en) * | 1989-05-15 | 1997-08-06 | International Business Machines Corporation | System for controlling access privileges |
| US5586260A (en) * | 1993-02-12 | 1996-12-17 | Digital Equipment Corporation | Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms |
| US5604803A (en) * | 1994-06-03 | 1997-02-18 | Sun Microsystems, Inc. | Method and apparatus for secure remote authentication in a public network |
| FI112895B (en) * | 1996-02-23 | 2004-01-30 | Nokia Corp | A method for obtaining at least one user-specific identifier |
| US6006333A (en) * | 1996-03-13 | 1999-12-21 | Sun Microsystems, Inc. | Password helper using a client-side master password which automatically presents the appropriate server-side password to a particular remote server |
| US5892828A (en) * | 1996-10-23 | 1999-04-06 | Novell, Inc. | User presence verification with single password across applications |
| US5944825A (en) * | 1997-05-30 | 1999-08-31 | Oracle Corporation | Security and password mechanisms in a database system |
| US6240184B1 (en) * | 1997-09-05 | 2001-05-29 | Rsa Security Inc. | Password synchronization |
| US6141760A (en) * | 1997-10-31 | 2000-10-31 | Compaq Computer Corporation | System and method for generating unique passwords |
| GB2349960A (en) * | 1999-05-08 | 2000-11-15 | Ibm | Secure password provision |
-
2001
- 2001-01-04 WO PCT/US2001/000249 patent/WO2001052025A2/en not_active Ceased
- 2001-01-04 AU AU2001227601A patent/AU2001227601A1/en not_active Abandoned
- 2001-01-04 GB GB0217052A patent/GB2375414B/en not_active Expired - Fee Related
Cited By (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2440425A (en) * | 2006-07-25 | 2008-01-30 | Intuit Inc | Single sign-on system which translates authentication tokens |
| GB2440425B (en) * | 2006-07-25 | 2012-01-11 | Intuit Inc | Method and apparatus for converting authentication-tokens |
| US8799639B2 (en) | 2006-07-25 | 2014-08-05 | Intuit Inc. | Method and apparatus for converting authentication-tokens to facilitate interactions between applications |
| WO2015171635A1 (en) * | 2014-05-06 | 2015-11-12 | Alibaba Group Holding Limited | Method, apparatus, and system for managing user accounts in the event of conflicting login names |
| CN105101196A (en) * | 2014-05-06 | 2015-11-25 | 阿里巴巴集团控股有限公司 | User account management method and device |
| JP2017515220A (en) * | 2014-05-06 | 2017-06-08 | アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited | Method, apparatus, and system for managing user accounts when login names conflict |
| US9811655B2 (en) | 2014-05-06 | 2017-11-07 | Alibaba Group Holding Limited | Method, apparatus, and system for managing user accounts |
| CN105101196B (en) * | 2014-05-06 | 2018-11-02 | 阿里巴巴集团控股有限公司 | A kind of user account management method and device |
| EP3792798A1 (en) * | 2014-05-06 | 2021-03-17 | Advanced New Technologies Co., Ltd. | Method, apparatus, and system for managing user accounts in the event of conflicting login names |
| CN104917749A (en) * | 2015-04-15 | 2015-09-16 | 腾讯科技(深圳)有限公司 | Account registration method and device |
| US11947658B2 (en) | 2016-06-23 | 2024-04-02 | Mindyourpass Holding B.V. | Password generation device and password verification device |
| US20240171567A1 (en) * | 2022-11-17 | 2024-05-23 | Dell Products L.P. | Per-server customized access credentials |
Also Published As
| Publication number | Publication date |
|---|---|
| GB2375414B (en) | 2004-08-11 |
| GB2375414A (en) | 2002-11-13 |
| GB0217052D0 (en) | 2002-08-28 |
| AU2001227601A1 (en) | 2001-07-24 |
| WO2001052025A3 (en) | 2002-05-02 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US6629246B1 (en) | Single sign-on for a network system that includes multiple separately-controlled restricted access resources | |
| US7500099B1 (en) | Method for mitigating web-based “one-click” attacks | |
| US7146404B2 (en) | Method for performing authenticated access to a service on behalf of a user | |
| JP4864289B2 (en) | Network user authentication system and method | |
| US6892307B1 (en) | Single sign-on framework with trust-level mapping to authentication requirements | |
| KR100781725B1 (en) | Method and system for peer-to-peer authorization | |
| US6199113B1 (en) | Apparatus and method for providing trusted network security | |
| US6691232B1 (en) | Security architecture with environment sensitive credential sufficiency evaluation | |
| US7039656B1 (en) | Method and apparatus for synchronizing data records between a remote device and a data server over a data-packet-network | |
| US6609198B1 (en) | Log-on service providing credential level change without loss of session continuity | |
| US7296077B2 (en) | Method and system for web-based switch-user operation | |
| JP4746053B2 (en) | Apparatus and method for controlling personal data | |
| US20020147929A1 (en) | Access control for distributed content servers | |
| US20040205243A1 (en) | System and a method for managing digital identities | |
| KR20040111638A (en) | Application generator | |
| CN115277234B (en) | Security authentication method and system based on Internet of things platform micro-service | |
| CN101076033B (en) | Method and system for storing authentication certificate | |
| US7181513B1 (en) | Restricting access to requested resources | |
| US6611916B1 (en) | Method of authenticating membership for providing access to a secure environment by authenticating membership to an associated secure environment | |
| US20070204156A1 (en) | Systems and methods for providing access to network resources based upon temporary keys | |
| US20040083296A1 (en) | Apparatus and method for controlling user access | |
| JPH11187016A (en) | Network authenticating system | |
| WO2001052025A2 (en) | Accessing multiple services with a unique user name | |
| GB2399435A (en) | Using generic user name and password to generate a token to access a service. | |
| WO1999056194A2 (en) | System and method for authenticating a user to multiple servers in a distributed computing network |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| ENP | Entry into the national phase |
Ref country code: GB Ref document number: 200217052 Kind code of ref document: A Format of ref document f/p: F |
|
| REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
| 122 | Ep: pct application non-entry in european phase | ||
| NENP | Non-entry into the national phase |
Ref country code: JP |