TYPED AUTHORIZATION DATA
First Claim
Patent Images
1. In a computing environment including at least a client, a service including functionality accessible by the client, and a token issuer, a method of requesting security tokens, the method comprising:
- accessing at the client, information to allow the client to request a token for accessing the functionality of the service; and
sending a client request from the client to the token issuer in a token request, the client request including the information and at least one of information defining the source of the information, proof of the source of the information or usage information specifying how the information should be used.
2 Assignments
0 Petitions
Accused Products
Abstract
Requesting security tokens with typed information. A method includes accessing at a client, information to allow the client to request a token for accessing functionality of a service. The method further includes sending a client request from the client to a token issuer in a token request. The client request includes the information and at least one of information defining the source of the information, proof of the source of the information; or usage information specifying how the information should be used.
-
Citations
20 Claims
-
1. In a computing environment including at least a client, a service including functionality accessible by the client, and a token issuer, a method of requesting security tokens, the method comprising:
-
accessing at the client, information to allow the client to request a token for accessing the functionality of the service; and sending a client request from the client to the token issuer in a token request, the client request including the information and at least one of information defining the source of the information, proof of the source of the information or usage information specifying how the information should be used. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. In a computing environment including at least a client, a service including functionality accessible by the client, and a token issuer, a method of providing security tokens, the method comprising:
-
receiving at the token issuer, a client request in a token request, the client request including information from a service and at least one of information defining the source of the information from the service, proof of the source of the information from the service;
or usage information specifying how the information should be used; andissuing a token to the client based on at least one of the source of the information from the service, proof of the source of the information from the service or usage information specifying how the information should be used. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A computer readable medium for use in a computing environment including at least a client, a service including functionality accessible by the client, and a token issuer, the computer readable medium comprising computer executable instructions for performing the following:
-
accessing at the client, information to allow the client to request a token for accessing the functionality of the service; and sending a client request from the client to the token issuer in a token request, the client request including the information and at least one of information defining the source of the information, proof of the source of the information or usage information specifying how the information should be used.
-
Specification