Maintaining authentication states for resources accessed in a stateless environment
First Claim
1. In a computer system that is network connectable to a network and that may receive requests via stateless protocols, wherein received requests may be requests to access resources included in the computer system, a method for validating authentication information that is associated with a request to access a resource so as to determine the state of the resource, the method comprising the following:
- a specific act of receiving a request to access a resource that requires authentication information; and
a specific act of adding validation information that is subsequently used along with the authentication information to determine whether access to the resource should be granted.
2 Assignments
0 Petitions
Accused Products
Abstract
A providing computer system may receive a request, via a stateless protocol, to access a resource. An access control application may refer to administrative rules to set validation information associated with the request. Validation information may be in the form of electronic text that is stored in a location such as a cookie or state-table. Validation information may indicate the state of a session associated with a resource, such as whether a session is in a logged-in or logged-out state. When a request is received, validation information and authentication information may be utilized together to determine if access to a resource should be granted. When access to a resource is granted or denied, validation information may be updated to indicate that the state of the session has changed.
-
Citations
41 Claims
-
1. In a computer system that is network connectable to a network and that may receive requests via stateless protocols, wherein received requests may be requests to access resources included in the computer system, a method for validating authentication information that is associated with a request to access a resource so as to determine the state of the resource, the method comprising the following:
-
a specific act of receiving a request to access a resource that requires authentication information; and
a specific act of adding validation information that is subsequently used along with the authentication information to determine whether access to the resource should be granted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. In a computer system that is network connectable to a network and that may receive requests via stateless protocols, wherein received requests may be requests to access resources, a method for validating authentication information included in a request to access a resource, wherein the request was received via a stateless protocol, so as to determine if a resource is in an accessible state, the method comprising the following:
-
a specific act of receiving an initial request to access the resource;
a specific act of referring to administrative rules to set validation information associated with the resource;
a specific act of receiving a second request to access the resource, the second request including the validation information; and
a specific act of using the validation information along with authentication information to determine whether access to the resource should be granted. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. In a computer system that is network connectable to a network and that may receive requests via stateless protocols, wherein received requests may be requests to access resources, a method for validating authentication information that is associated with a request to access a resource, and which was received via a stateless protocol, so as to determine if a resource is in an accessible state, the method comprising the following:
-
a specific act of receiving an initial request to access the resource;
a step for associating validation information with the resource in a subsequent request to access the resource so as to indicate the authentication information associated with the resource was manually reentered; and
a specific act of using the validation information along with the authentication information to determine whether access to the resource should be granted.
-
-
36. A computer program product for us in a providing computer system that is network connectable to a network and that may receive requests via stateless protocols, wherein received requests may be requests to access resources included in the providing computer system, the computer program product for implementing a method for validating authentication information received in a request to access a resource so as to determine the state of the resource, the computer program product comprising the following:
one or more computer-readable media carrying computer-executable instructions, that when executed at the computer system, cause the computer system to perform the method, including;
receiving a request to access a resource that requires authentication information; and
adding validation information that is subsequently used along with the authentication information to determine whether access to the resource should be granted. - View Dependent Claims (37)
-
38. A computer program product for use in a computer system that is network connectable to a network and that may receive requests via stateless protocols, wherein received requests may be requests to access resources, the computer program product for implementing a method for validating authentication information included in a request to access a resource, wherein the request was received via a stateless protocol, the computer program product comprising the following:
one or more computer-readable media carrying computer-executable instructions, that when executed at the computer system, cause the computer system to perform the method, including;
receiving an initial request to access the resource;
referring to administrative rules to set validation information associated with the resource;
receiving a second request to access the resource, the second request including the validation information; and
using the validation information along with authentication information to determine whether access to the resource should be granted. - View Dependent Claims (39)
-
40. A network system for validating authentication information associated with a request to access a resource, comprising:
-
a requesting computer system that includes a browser and is configured to transfer validation cookies, which include validation information used to validate authentication information contained in requests access to a resource, when the requesting computer systems requests access to the resource; and
a providing computer system that is network connectable to the requesting computer system and includes an application for validating authentication associated with a request to access the resource, wherein the providing computer system is configured to maintain log-in and log-out states for the resource.
-
-
41. In a computer system that is network connectable to a network and that may receive requests to access resources, a method for determining if access to a resource should be granted, the method comprising the following:
-
a specific act of receiving a request, via a stateless protocol, to access the resource;
a specific act of determining if the request is associated with authentication information appropriate for accessing the resource;
a specific act of determining if state information indicates that a session is in an appropriate state for accessing the resource; and
a specific act of grating access to the resource if the authentication information and the state are appropriate for accessing the resource.
-
Specification