×

Authentication arrangement

  • US 10,594,695 B2
  • Filed: 12/10/2007
  • Issued: 03/17/2020
  • Est. Priority Date: 12/10/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving with a proxy device and storing in a non-transitory memory of the proxy device a security token from an authentication provider device, the security token including authentication information, wherein the security token comprises information that allows access to a service provider and information that assigns the security token to the service provider;

    after said receiving with the proxy device and storing, in the non-transitory memory of the proxy device, the security token from the authentication provider device;

    receiving with the proxy device an authentication request directed to the authentication provider device or to the proxy device;

    determining with the proxy device whether the authentication information corresponds to the authentication request; and

    in case the authentication information corresponds to the authentication request, providing the security token from the proxy device as a response to the authentication request;

    after determining with the proxy device whether the authentication information corresponds to the authentication request;

    requesting a further security token from the authentication provider device;

    receiving at the proxy device said further security token as a response to said request for the further security token; and

    requesting additional security tokens with the proxy device in order to maintain a complement of security tokens within the proxy device in response to all security tokens received and stored being exhausted or having expired after a predetermined time interval, or in response to the proxy device having less than the complement of security tokens.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×