WO2006061844A2 - A method and system for rendering single sign on - Google Patents
A method and system for rendering single sign on Download PDFInfo
- Publication number
- WO2006061844A2 WO2006061844A2 PCT/IL2005/001333 IL2005001333W WO2006061844A2 WO 2006061844 A2 WO2006061844 A2 WO 2006061844A2 IL 2005001333 W IL2005001333 W IL 2005001333W WO 2006061844 A2 WO2006061844 A2 WO 2006061844A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- window
- user
- machine
- profile
- identifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
Definitions
- the present invention relates to the field of Single Sign On.
- domain sometimes even for a plurality of accounts to the same domain.
- SSO Single Sign On
- An SSO server 10 signs on behalf of the user 30 to domains 20 (e.g. application 21, resource 22, network 23).
- domains 20 e.g. application 21, resource 22, network 23.
- SSO systems provide the following benefits: - A user does not have to remember all its domains' passwords (user ID, etc.), but rather one password.
- the present invention is directed to a method for rendering single sign on by a user, the method comprising the steps of: providing the user with at least one template for uniquely identifying a window; detecting an opened window; identifying the window using the at least one template; and activating a profile, corresponding to the window, for filling-in at least one value in a corresponding input field of the window.
- a template may comprise data and/or execution code.
- a profile may comprise also data and/or execution code.
- the data of a profile may comprise at least one value which has been filled-in by the user in an input field of the window.
- a profile is kept in a secured form, e.g. in an encrypted form.
- the profile is stored in a repository residing on a machine (e.g. computer) of the user.
- the profile is stored in a repository residing on a remote location accessible over a network by a machine of the user.
- the profile is stored in a repository residing on a security token accessible by a machine of the user.
- detecting an opened window is carried out by examining system messages regarding events occurring in the machine of the user.
- detecting an opening window is carried out by comparing a recent list of opened windows on the machine of the user with a previous list of opened windows on the machine of the user. Identifying the window may be carried out by a match between a value of at least one parameter of the window and a corresponding value thereof. Execution code may also be employed for identifying the window.
- the activation of a corresponding profile to the window comprises filling in at least one input field of the window according to the second set of one or more rules.
- the present invention is directed to a system for rendering single sign on by a user, the system comprising: a templates repository for storing at least one template for uniquely identifying a window, the templates repository being accessible by a machine of the user; a profiles repository, accessible to the machine of the user, for storing at least one profile for filling-in at least one value in a corresponding input field of the window; and an agent at the machine of the user, for identifying the window upon opening, and for activating a corresponding profile for filling-in at least one value in at least one input field of the window.
- the profiles repository may reside at a machine of the user, at a remote location accessible over a network by a machine of the user, at a security token accessible by a machine of the user, and so forth.
- the present invention is directed to a system for rendering single sign on by a user, the system comprising a security token for storing information to be filled-in in behalf of the user in at least one input field of a window of a software application (including a Web browser), thereby rendering single sign on without a server, and securely storing the information.
- Fig. 1 schematically illustrates an SSO system, according to the prior art.
- Fig. 2 is a flowchart of a method for rendering single sign on, according to a preferred embodiment of the invention.
- Fig. 3 illustrates a sign on window.
- Fig. 4 is a table of the parameters of the SEND button of Fig. 3.
- Fig. 5 is a flowchart of a method for identifying a window using templates, according to a preferred embodiment of the invention.
- Fig. 6 is a flowchart of a process for activating a profile, according to one embodiment of the invention. It specifies block 330 of Fig. 5.
- Fig. 7 schematically illustrates an SSO system, according to a preferred embodiment of the present invention.
- Fig. 8 schematically illustrates an SSO system, according to another preferred embodiment of the invention.
- FIG. 9 schematically illustrates an SSO system, according to yet another embodiment of the invention. Detailed Description of Preferred Embodiments
- Fig. 2 is a flowchart of a method for rendering single sign on, according to a preferred embodiment of the invention.
- a new opened window i.e. "popped-up" is detected.
- the window is identified. Uniquely identifying a window is a problematic issue. It is discussed hereinafter.
- the filled-in information is submitted (e.g. when the user clicks the "OK” button).
- detecting a popped-up window is carried out by system API functions which "listen" to messages regarding events that happen in the system.
- One of the events that are reported by such messages is opening a new window.
- an agent executed on user's computer gets a list of opened windows from the operating system, and compares it with a previous list of opened windows. By comparing the current list with the previous list, new opened windows can be detected. Such an operation can be carried out periodically (for example each N seconds). Of course the comparison can also be carried out when a new window pops up. Uniquely identifying a window
- Fig. 3 illustrates a sign on window.
- the window comprises the following elements: Input fields 210 and 220, Send button 230, caption controls 240 and 250.
- Send button 230 When a user clicks the SEND button, the information typed in the input fields is sent to a destination thereof.
- An application can be designed to cooperate with an SSO system, i.e. to provide to the SSO system a unique identifier to the opened window, which fields is expected to be filled-in, etc.
- Fig. 4 is a table of the parameters of the SEND button 230 of Fig. 3.
- Table 260 comprises a plurality of parameters.
- the window illustrated in Fig. 3 and its elements 210 to 250 comprise also a plurality of parameters.
- a window is uniquely identified according to values of its parameters and/or values of the parameters of its elements. Of course not all the parameters have to be taken in consideration.
- a window can be uniquely identified by the Caption of the window and the text within the window and controls (e.g. buttons, input fields, etc.). However, sometimes these parameters are not adequate to uniquely identify a window, and therefore employing executable code for this matter may be helpful. Templates
- template refers herein to a set of one or more rules for identifying a window.
- a log-on window of an application can be identified by the presence of the text "Please enter your password" in the window.
- a template for identifying a window as the log-on window has to look for certain text within the window's fields.
- a template's rule can comprise data and/or execution code, such as script.
- a template is oriented to identify a certain window.
- the templates are activated one by one, until one of the templates identifies the window, or until the last template fails to identify the window.
- only certain templates may be activated. For example, activating only the templates that belong to a certain application; activating only templates that deal with the same type of the opened window, etc.
- Fig. 5 is a flowchart of a method for identifying a window using templates, according to a preferred embodiment of the invention.
- next template in the relevant group of templates (e.g. that belong to an application and deal with the same type of window as the current tested window) is activated.
- profile refers herein to a set of one or more operations to be performed upon identifying a window.
- a typical operation of a profile is filling in corresponding details in the input fields of the window, such as user name, password, user ID, PIN, credit card details, etc.
- a profile may comprise also execution code. For example, in case where the user has to change his password once in a while, i.e. when the data is not static, the execution code can generate a random password according to the password policy of the organization (e.g. at least 8 characters, of which at least one is a symbol).
- Fig. 6 is a flowchart of a process for activating a profile, according to one embodiment of the invention. It specifies block 330 of Fig. 5.
- Block 430 denotes a "wait" operation. Actually, the flow continues to block 440 when the filled-in information is submitted, for example when the user has clocked the OK or SEND button.
- the executable code is executed.
- the ability to execute an executable code is for allowing operations which are more complicated that filling in values into corresponding fields. This way the behavior of an application program can be modified. For example, using executable code a user can keep a history of the entrances to his bank account.
- the current filled-in information is stored in a database as the corresponding information of this window.
- the information is retrieved from the database, and filled-into the corresponding fields of the window.
- repository refers herein to means for storing digital information, such as a file, memory, database, a remote digital storage, etc.
- Fig. 7 schematically illustrates an SSO system, according to a preferred embodiment of the present invention. From the operational point of view, the SSO system comprises the following components:
- An SSO manager 40 which is a platform for: ⁇ an SSO templates repository 42, for storing templates.
- a Template Manager 41 for managing (creating, editing, modifying, retrieving, etc.), and optionally distributing the templates to users' machines.
- a templates repository 32 for storing templates.
- a profiles repository 33 which is a collection of fill-in information and/or procedures to be carried out upon identifying a window.
- An SSO client 31 which is a software application to be executed at the user's machine (also referred herein as "agent"), for at least: ⁇ detecting a new opened window on user's machine;
- an SSO system according to the present invention does not comprise an online
- security token (sometimes called also authentication token) refers herein to a typically small and mobile device that stores information in a secured manner, typically using hardware protection means such as smart card, and connects to a computer via wired (e.g. USB) or wireless (e.g. infrared) means.
- wired e.g. USB
- wireless e.g. infrared
- a security token provides hardware protection to data it stores, the stored information is more secure than information stored at a computer, even in case where the information is kept at the computer in an encrypted form.
- Security tokens usually have also an ability to render cryptographic operations. Therefore confidential information stored within a security token is usually kept in an encrypted form.
- a security token provides also portability.
- a security token for storing profiles (and also templates) a user may implement an SSO logon from different computers.
- Fig. 8 schematically illustrates an SSO system, according to another preferred embodiment of the invention.
- the profile database 33 is stored within a security token 50 rather than on user's machine 20.
- the templates may also be stored in the security token.
- Two-factor authentication is based on employing two information entities for authentication: something a user knows (e.g. a password) and something the user has (e.g. a unique security token). Typically interacting with a host in a two-factor authentication session is carried out by a challenge/response process.
- One-time password methods can also be employed for achieving better security level. In this case each time a user requests a service, a different password is employed.
- the communication between the user's machine 30 and the security token 50 is encrypted in order to gain even a better security level.
- Fig. 9 schematically illustrates an SSO system, according to yet another embodiment of the invention.
- the user's SSO information is stored in the security token 50.
- the applicant regards the use of a security token for storing user's SSO information (for example, user's credentials, passwords, user IDs, and so forth) as innovative in SSO systems.
- user's SSO information for example, user's credentials, passwords, user IDs, and so forth
- the information which has sensitive nature, is stored in a more secured manner than in the prior art.
- the mobility of a security token enables to sign on to a domain from different terminals.
- One object of the present invention is to simplify access control and identity management in an enterprise environment (a firm, an Internet Service Provider, etc.).
- enterprise applications impose an access control mechanism and require user identification before access is permitted.
- Most applications use the old-fashioned user name and password concept to allow access.
- passwords When using a password, one should remember the disadvantages thereof - passwords are costly to administer, hard to remember and vulnerable to attacks.
- the present invention simplifies the use of passwords, enabling the user to remember only one PIN (Personal Identification Number) and then apply the right credentials to the application when it opens on the user's desktop.
- PIN Personal Identification Number
- the present invention may be used in an organization (a firm, an Internet
- the present invention provides to a system administrator a complete control over the allocation and deployment of the SSO within the organization, since the system administrator can decide which templates to distribute to a user, and which individual sign on characteristics to allow to a certain user.
- a system administrator can create new templates for an application, create additional templates for the application or where applicable to add an additional window for the same template.
- templates are very useful in an organization.
- An organization typically employs an IT (Information Technology) team for maintaining organization's computerized systems. After an IT team creates templates for identifying sign on windows of an application (e.g. the mail system of the organization), the created templates can be distributed to the users of the organization.
- IT Information Technology
- the user can create profiles on his personal security token for these applications. Users can create a new profile for an application, create additional profiles for that application or where applicable add an additional window for the same profile.
- An SSO Client stores authentication credentials for a given application in a profile.
- the templates created for signing on to an application are distributed to its users, any users, not necessarily the users of an organization.
- an application program can be distributed by its manufacturer / vendor with pre-prepared templates thereof.
- templates are distributed to a user's machine by common methods for distributing software and/or data, such as via the Internet, online installation, installation disk, etc.
- a template can reside on other places than on the user's machine, as long as it is accessible to a user's machine.
- a template may reside on a remote server, and be accessible to the user's machine via a network such as LAN, WAN and Internet.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Digital Computer Display Output (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IL183629A IL183629A0 (en) | 2004-12-10 | 2007-06-03 | A method and system for rendering a single sign on |
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US63455604P | 2004-12-10 | 2004-12-10 | |
| US60/634,556 | 2004-12-10 | ||
| US11/073,672 US20060206930A1 (en) | 2005-03-08 | 2005-03-08 | Method and system for rendering single sign on |
| US11/073,672 | 2005-03-08 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2006061844A2 true WO2006061844A2 (en) | 2006-06-15 |
| WO2006061844A3 WO2006061844A3 (en) | 2007-01-11 |
Family
ID=36578317
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IL2005/001333 Ceased WO2006061844A2 (en) | 2004-12-10 | 2005-12-11 | A method and system for rendering single sign on |
Country Status (2)
| Country | Link |
|---|---|
| TW (1) | TW200637326A (en) |
| WO (1) | WO2006061844A2 (en) |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8185938B2 (en) * | 2001-03-29 | 2012-05-22 | International Business Machines Corporation | Method and system for network single-sign-on using a public key certificate and an associated attribute certificate |
| US20030112874A1 (en) * | 2001-12-19 | 2003-06-19 | Moonlight Cordless Ltd. | Apparatus and method for detection of scene changes in motion video |
-
2005
- 2005-11-02 TW TW094138434A patent/TW200637326A/en unknown
- 2005-12-11 WO PCT/IL2005/001333 patent/WO2006061844A2/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2006061844A3 (en) | 2007-01-11 |
| TW200637326A (en) | 2006-10-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11886525B2 (en) | Systems and methods for presenting additional content for a network application accessed via an embedded browser of a client application | |
| JP6625636B2 (en) | Identity infrastructure as a service | |
| EP3123692B1 (en) | Techniques to operate a service with machine generated authentication tokens | |
| US11172029B2 (en) | Systems and methods for sharing SaaS content across workspace | |
| US8438400B2 (en) | Multiple user desktop graphical identification and authentication | |
| US11489933B2 (en) | Systems and methods for gamification of SaaS applications | |
| US20170257363A1 (en) | Secure mobile device two-factor authentication | |
| US11531929B2 (en) | Systems and methods for machine generated training and imitation learning | |
| US11592966B2 (en) | Systems and methods for SaaS overlays using embedded browser | |
| US20050050324A1 (en) | Administrative system for smart card technology | |
| JP6998497B1 (en) | Systems and methods for live SAAS objects | |
| US20200151243A1 (en) | Systems and methods for rich input into text fields using an embedded browser | |
| US11829191B2 (en) | Systems and methods for deep linking of SaaS application via embedded browser | |
| US20200153711A1 (en) | Systems and methods for tracking overlay for saas applications | |
| JP6994607B1 (en) | Systems and methods for intellisense for SAAS applications | |
| CN115134110A (en) | Injecting risk assessment in user authentication | |
| US20060206930A1 (en) | Method and system for rendering single sign on | |
| US20050138435A1 (en) | Method and system for providing a login and arbitrary user verification function to applications | |
| WO2006061844A2 (en) | A method and system for rendering single sign on | |
| EP1901196A2 (en) | Method of and system for security and privacy protection in medical forms | |
| US20090228885A1 (en) | System and method for using workflows with information cards | |
| Vacca | Single Sign-On for the Enterprise |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KN KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| WWE | Wipo information: entry into national phase |
Ref document number: 183629 Country of ref document: IL |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWP | Wipo information: published in national office |
Ref document number: 183629 Country of ref document: IL |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 05814435 Country of ref document: EP Kind code of ref document: A2 |