US 7,322,040 B1 | ||
Authentication architecture | ||
Lance E. Olson, Sammamish, Wash. (US); Henrik Frystyk Nielsen, Seattle, Wash. (US); and Cem Paya, Seattle, Wash. (US) | ||
Assigned to Microsoft Corporation, Redmond, Wash. (US) | ||
Filed on Mar. 27, 2001, as Appl. No. 9/818,358. | ||
Int. Cl. G06F 17/30 (2006.01); H04L 9/32 (2006.01) |
U.S. Cl. 726—8 [726/2] | 25 Claims |
1. A computer implemented system that utilizes a processor and that facilitates an application to produce a response to an
authentication challenge, comprising the following computer executable components:
a learning component that determines anticipated authentication challenges to resource requests from applications based upon
run-time learning during previous resource requests by applications;
an authentication manager that receives first data associated with the communication challenge and processes the first data
into second data of a first type appropriate for a first authentication module, the authentication manager further communicates
the second data to at least one authentication module, the authentication manager further communicates the second data to
the at least one different authentication module if the first module is unable to process the authentication challenge, the
second data is related to the first data and the authentication challenge, the authentication manager also generates one or
more pseudo-challenges of its own not in response to the authentication challenge and communicates the data associated with
the pseudo-challenges to at least one authentication module;
at least one authentication module that receives the second data from the authentication manager and produces third data related
to responding to the authentication challenge; and
a cache that stores one or more third data related to responding to the authentication challenge and the one or more pseudo-challenges.
|