Centralized authentication for granting access to online services
First Claim
1. A method to authenticate a first device for access to a first service provider, the method comprising:
- sending, by executing a first instruction with a processor at the first service provider, an authentication request from the first service provider to a second service provider, the authentication request generated in response to an access request from the first device, the authentication request including an identification code assigned to the first device by the second service provider;
obtaining, at the first service provider, an authentication response from the second service provider, the authentication response generated by the second service provider in response to the authentication request; and
when the authentication response indicates the first service provider is not permitted to access centralized authentication information associated with the first device, both (i) sending, by executing a second instruction with the processor, a permission request from the first service provider to the second service provider to request access to the centralized authentication information associated with the first device, and (ii) performing, by executing a third instruction with the processor, a local access control procedure associated with the first service provider to determine whether to grant the first device access to the first service provider.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) to authenticate a first device for access to a first service provider are disclosed. Example methods disclosed herein include sending, by executing a first instruction with a processor at a first service provider, an authentication request from the first service provider to a second service provider. The authentication request is generated in response to an access request from the first device and includes an identification code assigned to the first device by the second service provider. Example methods also include obtaining, at the first service provider, an authentication response from the second service provider. The authentication response is generated by the second service provider in response to the authentication request. Example methods further include, based on the authentication response, granting, by executing a second instruction with the processor, the first device access to the first service provider.
-
Citations
15 Claims
-
1. A method to authenticate a first device for access to a first service provider, the method comprising:
-
sending, by executing a first instruction with a processor at the first service provider, an authentication request from the first service provider to a second service provider, the authentication request generated in response to an access request from the first device, the authentication request including an identification code assigned to the first device by the second service provider; obtaining, at the first service provider, an authentication response from the second service provider, the authentication response generated by the second service provider in response to the authentication request; and when the authentication response indicates the first service provider is not permitted to access centralized authentication information associated with the first device, both (i) sending, by executing a second instruction with the processor, a permission request from the first service provider to the second service provider to request access to the centralized authentication information associated with the first device, and (ii) performing, by executing a third instruction with the processor, a local access control procedure associated with the first service provider to determine whether to grant the first device access to the first service provider. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A tangible computer readable storage medium comprising computer readable instructions which, when executed, cause a computer at a first service provider to perform operations comprising:
-
generating an authentication request to a second service provider, the authentication request generated in response to an access request from a first device, the authentication request including at least one of an identification code assigned to the first device by the second service provider and location information identifying a location of the first device; evaluating an authentication response from the second service provider, the authentication response being generated by the second service provider in response to the authentication request; and when the authentication response indicates the first service provider is not permitted to access centralized authentication information associated with the first device, both (i) sending a permission request from the first service provider to the second service provider to request access to the centralized authentication information associated with the first device, and (ii) performing a local access control procedure associated with the first service provider to determine whether to grant the first device access to the first service provider. - View Dependent Claims (9, 10, 11)
-
-
12. An access controller to control access to a first service provider, the access controller comprising:
-
memory including machine readable instructions; and a processor at the first service provider, the processor to execute the machine readable instructions to perform operations comprising; generating an authentication request in response to an access request from a first device, the authentication request including at least one of an identification code assigned to the first device by a second service provider and location information identifying a location of the first device; evaluating an authentication response from the second service provider, the authentication response being generated by the second service provider in response to the authentication request; and when the authentication response indicates the first service provider is not permitted to access centralized authentication information associated with the first device, both (i) sending a permission request from the first service provider to the second service provider to request access to the centralized authentication information associated with the first device, and (ii) performing a local access control procedure associated with the first service provider to determine whether to grant the first device access to the first service provider. - View Dependent Claims (13, 14, 15)
-
Specification