A customer server receives a client request to access protected resources over the Internet. First factor authentication is performed and if it is successful a vendor authentication engine is invoked to undertake second factor authentication. The results of the second factor authentication are returned to the customer server, which grants access only if both first and second factor authentication succeeds.

 
Web www.patentalert.com

< Integrated change management unit

> SYSTEM FOR POLICING JUNK E-MAIL MESSAGES

~ 00467