Authentication arrangement
First Claim
Patent Images
1. A method comprising:
- receiving with a proxy device and storing in a non-transitory memory of the proxy device a security token from an authentication provider device, the security token including authentication information, wherein the security token comprises information that allows access to a service provider and information that assigns the security token to the service provider;
after said receiving with the proxy device and storing, in the non-transitory memory of the proxy device, the security token from the authentication provider device;
receiving with the proxy device an authentication request directed to the authentication provider device or to the proxy device;
determining with the proxy device whether the authentication information corresponds to the authentication request; and
in case the authentication information corresponds to the authentication request, providing the security token from the proxy device as a response to the authentication request;
after determining with the proxy device whether the authentication information corresponds to the authentication request;
requesting a further security token from the authentication provider device;
receiving at the proxy device said further security token as a response to said request for the further security token; and
requesting additional security tokens with the proxy device in order to maintain a complement of security tokens within the proxy device in response to all security tokens received and stored being exhausted or having expired after a predetermined time interval, or in response to the proxy device having less than the complement of security tokens.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, a proxy, a device, a system, and a computer program product for enabling authentication is provided. Authentication is enabled by receiving by a proxy a security token from an authentication provider, the security token including authentication information, receiving by the proxy an authentication request directed to the authentication provider or to the proxy, determining by the proxy whether the authentication information corresponds to the authentication request, and in case the authentication information corresponds to the authentication request, providing by the proxy the security token as a response to the authentication request.
46 Citations
18 Claims
-
1. A method comprising:
-
receiving with a proxy device and storing in a non-transitory memory of the proxy device a security token from an authentication provider device, the security token including authentication information, wherein the security token comprises information that allows access to a service provider and information that assigns the security token to the service provider; after said receiving with the proxy device and storing, in the non-transitory memory of the proxy device, the security token from the authentication provider device; receiving with the proxy device an authentication request directed to the authentication provider device or to the proxy device; determining with the proxy device whether the authentication information corresponds to the authentication request; and in case the authentication information corresponds to the authentication request, providing the security token from the proxy device as a response to the authentication request; after determining with the proxy device whether the authentication information corresponds to the authentication request; requesting a further security token from the authentication provider device; receiving at the proxy device said further security token as a response to said request for the further security token; and requesting additional security tokens with the proxy device in order to maintain a complement of security tokens within the proxy device in response to all security tokens received and stored being exhausted or having expired after a predetermined time interval, or in response to the proxy device having less than the complement of security tokens. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 17)
-
-
11. An apparatus, comprising:
at least one processor and a non-transitory memory storing a set of computer instructions, in which the at least one processor and the non-transitory memory storing the computer instructions are configured to cause the apparatus at least; to receive and store in the non-transitory memory a security token received from the authentication provider device through a communication interface, the security token including authentication information, wherein the security token comprises information that allows access to a service provider and information that assigns the security token to the service provider; and after said receipt and storage; to process an authentication request received through the communication interface of the apparatus, the authentication request having been directed to the authentication provider device or to the apparatus; to determine whether the authentication information corresponds to the authentication request; and in case the authentication information corresponds to the authentication request, to provide the security token through the communication interface; after said determination; requesting a further security token from the authentication provider device; receiving with the apparatus said further security token as a response to said request for the further security token; and requesting additional security tokens in order to maintain a complement of security tokens within the apparatus in response to all security tokens received and stored being exhausted or having expired after a predetermined time interval, or in response to the apparatus having less than the complement of security tokens. - View Dependent Claims (12, 13, 14, 15, 18)
-
16. A computer program product embodied on a non-transitory computer readable memory comprising computer executable program code which, when executed with at least one processor of an apparatus, causes the apparatus to perform:
-
receiving with the apparatus and storing in a non-transitory memory of the apparatus a security token from the authentication provider device, the security token including authentication information, wherein the security token comprises information that allows access to a service provider and information that assigns the security token to the service provider; and after said receiving and storing with the apparatus; receiving with the apparatus an authentication request directed to the authentication provider device or to the apparatus; determining with the apparatus whether the authentication information corresponds to the authentication request; and in case the authentication information corresponds to the authentication request, providing the security token from the apparatus as a response to the authentication request; after said determining with the apparatus; requesting a further security token from the authentication provider device; receiving at the apparatus said further security token as a response to said request for the further security token; and requesting additional security tokens with the apparatus in order to maintain a complement of security tokens within the apparatus in response to all security tokens received and stored being exhausted or having expired after a predetermined time interval, or in response to the apparatus having less than the complement of security tokens.
-
Specification