Proxy Authentication and Indirect Certificate Chaining
First Claim
Patent Images
1. A method comprising:
- receiving, at a proxy server, a communication from a client configured to cause the proxy server to perform tasks on the client'"'"'s behalf;
submitting a request to an authentication server on behalf of the client; and
caching, at the proxy server, one or more security tokens received from the authentication server in response to the request.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of proxy authentication and indirect certificate chaining are described herein. In an implementation, authentication for a client occurs via a proxy service. Proxy service communicates between client and server, and caches security tokens on behalf of the client. In an implementation, trustworthiness of certificate presented to a client to establish trust is determined utilizing a signed data package which incorporates a plurality of known certificates. The presented certificate is verified without utilizing root certificates installed on the client device.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, at a proxy server, a communication from a client configured to cause the proxy server to perform tasks on the client'"'"'s behalf;
submitting a request to an authentication server on behalf of the client; and
caching, at the proxy server, one or more security tokens received from the authentication server in response to the request. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
maintaining, on behalf of a client on a proxy server remote from the client, one or more security tokens configured to prove an identity of the client and received from an authentication service; and
upon request from the client, presenting one said security token on the client'"'"'s behalf to permit the client to access to corresponding services. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
receiving at a client a certificate via a network presented by a party to establish trust;
determining whether the received certificate corresponds to a known certificate maintained in a signed data package; and
establishing trust in the party based on the determination. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification