AUTHENTICATION ARRANGEMENT
2 Assignments
0 Petitions
Accused Products
Abstract
A method, a proxy, a device, a system, and a computer program product for enabling authentication is provided. Authentication is enabled by receiving by a proxy a security token from an authentication provider, the security token including authentication information, receiving by the proxy an authentication request directed to the authentication provider or to the proxy, determining by the proxy whether the authentication information corresponds to the authentication request, and in case the authentication information corresponds to the authentication request, providing by the proxy the security token as a response to the authentication request.
-
Citations
39 Claims
-
1-20. -20. (canceled)
-
21. A method comprising:
-
receiving by a proxy a security token from an authentication provider, the security token including authentication information; receiving by the proxy an authentication request directed to the authentication provider or to the proxy; determining by the proxy whether the authentication information corresponds to the authentication request; and in case the authentication information corresponds to the authentication request, providing by the proxy the security token as a response to the authentication request. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. An apparatus, comprising:
-
a communication interface configured to handle at least one communication connection of the apparatus; and a processing module configured to; process a security token received from an authentication provider through the communication interface, the security token including authentication information; process an authentication request received through the communication interface, the authentication request having been directed to the authentication provider or to the apparatus; determine whether the authentication information corresponds to the authentication request; and provide the security token through the communication interface in case the authentication information corresponds to the authentication request. - View Dependent Claims (33, 34, 35, 36)
-
-
37. A system comprising:
-
an authentication provider configured to perform initial authentication; and a proxy configured to; receive a security token from the authentication provider, the security token including authentication information; receive an authentication request, the authentication request having been directed to the authentication provider or to the proxy; determine whether the authentication information corresponds to the authentication request; and provide the security token as a response to the authentication request in case the authentication information corresponds to the authentication request. - View Dependent Claims (38)
-
-
39. A computer program embodied on a computer readable medium comprising computer executable program code which, when executed by at least one processor of an apparatus, causes the apparatus to perform:
-
receiving by the apparatus a security token from an authentication provider, the security token including authentication information; receiving by the apparatus an authentication request directed to the authentication provider or to the apparatus; determining by the apparatus whether the authentication information corresponds to the authentication request; and in case the authentication information corresponds to the authentication request, providing by the apparatus the security token as a response to the authentication request.
-
Specification