A computer implemented method to improve security in authentication/authorization systems and computer programs products thereof
a technology of authentication/authorization system and computer program, applied in the field of computer program products and authentication/authorization system, can solve the problems of increasing complexity of many security techniques, too expensive to afford, and the way of accessing specific resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038]To achieve the above, the invention provides in a first aspect a computer implemented method to improve security in authentication / authorization systems, which comprises: receiving, a first server, from a user having a computing device, a request to be logged into a service of said first server; and authenticating, said first server, credentials information of said user in order to authorize said service request.
[0039]In a characteristic manner and on contrary of the known proposals, the computer implemented method of the first aspect further comprises the use of a second server, in connection with said user computing device that has installed therein a dedicated program, for receiving from the first server a first request about a status associated to said user in order to assist the first server in authorizing or rejecting the requested service logging, and in case said requested service logging being authorized, and a request is done by the user to perform an operation in th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 