ADDING CLIENT AUTHENTICATION TO NETWORKED COMMUNICATIONS
First Claim
Patent Images
1. A method comprising:
- receiving a request from a client, the request to be passed through to a target server;
constructing a challenge for the client, the challenge based on the request;
transmitting the challenge to the client;
receiving a response to the challenge from the client;
verifying the response; and
if the response is valid, forwarding the request to the target server.
1 Assignment
0 Petitions
Accused Products
Abstract
A pass-through agent receives a request from a client and authenticates the client before forwarding the request to a target server that lacks client authentication capability. The target server is configured to accept requests from the pass-through agent, and may be configured to reject requests that do not come from the pass-through agent.
70 Citations
22 Claims
-
1. A method comprising:
-
receiving a request from a client, the request to be passed through to a target server; constructing a challenge for the client, the challenge based on the request; transmitting the challenge to the client; receiving a response to the challenge from the client; verifying the response; and if the response is valid, forwarding the request to the target server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
intercepting a request directed to a software agent; authenticating a sender of the request; and if the authenticating is successful, forwarding the request to the software agent. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A system comprising:
-
a service provider to execute a request received via an unauthenticated channel; and a security agent to receive a request from a client, validate the client and pass the request to the service provider via the unauthenticated channel. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A machine-readable medium storing data and instructions to cause a programmable processor to perform operations comprising:
-
accepting a Transmission Control Protocol/Internet Protocol (“
TCP/IP”
) connection from a client;receiving a request from the client over the TCP/IP connection; sending a challenge based on the request to the client over the TCP/IP connection; receiving a response to the challenge from the client over the TCP/IP connection; validating the response; and if the response is successfully validated, sending the request to a target server. - View Dependent Claims (20, 21, 22)
-
Specification