System and method for pool-based identity authentication for service access without use of stored credentials
First Claim
Patent Images
1. A method comprising:
- receiving, by a service provider from a service consumer, a service request representing a request to access a service;
verifying, by the service provider, content of the service request against independently verifiable data corresponding to the service consumer, the independently verifiable data being obtained independently of a service provider providing the requested service;
authenticating, at the service provider, of the service request by the service provider;
sending, to an authentication authority, a request to authenticate the service request; and
receiving, from the authentication authority, a validation response to the request to authenticate the service request; and
providing, by the service provider, the service to the service consumer based on the verifying the content of the service request and the authenticating of the service request.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method in an example embodiment includes providing provisioning information for storage in a provisioning repository; receiving a service request from a service consumer, the service request including requestor identifying information; generating an authentication request to send to an authentication authority, the authentication request including requestor identifying information; receiving validation of an authenticated service request from the authentication authority; and providing the requested service to the service consumer.
35 Citations
20 Claims
-
1. A method comprising:
-
receiving, by a service provider from a service consumer, a service request representing a request to access a service; verifying, by the service provider, content of the service request against independently verifiable data corresponding to the service consumer, the independently verifiable data being obtained independently of a service provider providing the requested service; authenticating, at the service provider, of the service request by the service provider; sending, to an authentication authority, a request to authenticate the service request; and receiving, from the authentication authority, a validation response to the request to authenticate the service request; and providing, by the service provider, the service to the service consumer based on the verifying the content of the service request and the authenticating of the service request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a memory device for storing instructions; and a processor, which, when executing the instructions, causes the system to perform operations comprising; receiving, by a service provider from a service consumer, a service request representing a request to access a service; verifying, by the service provider, content of the service request against independently verifiable data corresponding to the service consumer, the independently verifiable data being obtained independently of a service provider providing the requested service; authenticating, at the service provider, of the service request by the service provider; sending, to an authentication authority, a request to authenticate the service request; and receiving, from the authentication authority, a validation response to the request to authenticate the service request; and providing, by the service provider, the service to the service consumer based on the verifying the content of the service request and the authenticating of the service request. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer readable non-transitory storage medium storing at least one program configured for execution by a computer, the at least one program comprising instructions to perform operations comprising:
-
receiving, by a service provider from a service consumer, a service request representing a request to access a service; verifying, by the service provider, content of the service request against independently verifiable data corresponding to the service consumer, the independently verifiable data being obtained independently of a service provider providing the requested service; authenticating, at the service provider, of the service request by the service provider; sending, to an authentication authority, a request to authenticate the service request; and receiving, from the authentication authority, a validation response to the request to authenticate the service request; and providing, by the service provider, the service to the service consumer based on the verifying the content of the service request and the authenticating of the service request. - View Dependent Claims (20)
-
Specification