POLICY-BASED AUTHENTICATION
First Claim
Patent Images
1. A method implemented by a computing device, the method comprising:
- receiving, by the computing device, a request to authenticate an end user of a user device based on a requested use of an application by the user device;
communicating, by the computing device, with an authentication client, provided in the user device, to perform an authentication requested by the request;
generating, by the computing device, a response to the request based on the communication with the authentication client, where the response indicates that the end user is or is not authenticated to use the application; and
providing, by the computing device, the response to an application server device hosting the application.
2 Assignments
0 Petitions
Accused Products
Abstract
A device receives a request to authenticate an end user of a user device based on a requested use of an application by the user device, and communicates with an authentication client, provided in the user device, to perform an authentication requested by the request. The device also generates a response to the request based on the communication with the authentication client, where the response indicates that the end user is or is not authenticated to use the application. The device further provides the response to an application server device hosting the application.
-
Citations
20 Claims
-
1. A method implemented by a computing device, the method comprising:
-
receiving, by the computing device, a request to authenticate an end user of a user device based on a requested use of an application by the user device; communicating, by the computing device, with an authentication client, provided in the user device, to perform an authentication requested by the request; generating, by the computing device, a response to the request based on the communication with the authentication client, where the response indicates that the end user is or is not authenticated to use the application; and providing, by the computing device, the response to an application server device hosting the application. - View Dependent Claims (2, 3, 4)
-
-
5. A method implemented by a computing device, the method comprising:
-
receiving, by the computing device, a request to authenticate an end user of a user device based on a requested use of an application by the user device; evaluating, by the computing device, policies for an application identifier and an end user identifier to determine what and if authentication is required for the end user; providing, by the computing device, the request to an authentication enabler device for performance of an authentication determined by the evaluation; receiving, by the computing device and from the authentication enabler device, a response indicating that the end user is or is not authenticated to use the application; and providing, by the computing device, the response to an application server device hosting the application. - View Dependent Claims (6, 7)
-
-
8. A method implemented by a computing device, the method comprising:
-
receiving, by the computing device, a request to authenticate an end user of a user device, where the request includes an application identifier and an end user identifier; evaluating, by the computing device, policies for the application identifier and the end user identifier to determine what and if authentication is required for the end user; retrieving, by the computing device and when authentication is required, authentication requirements and a token associated with the application and end user identifiers; determining, by the computing device, whether the token is present and valid; and providing, to an application server hosting the application and when the token is present and valid, a response indicating that the end user is or is not authenticated to use the application. - View Dependent Claims (9, 10, 11)
-
-
12. A method implemented by a computing device, the method comprising:
-
receiving, by the computing device, a request for a service and for authentication of a requester associated with a user device; receiving, by the computing device and from a database, credentials associated with the requester; communicating, by the computing device, with an authentication client, provided in the user device, to retrieve identification information of the requester; determining, by the computing device and based on the credentials and the identification information, whether the requester is authenticated to receive the service; generating, by the computing device and based on the determination, a response indicating that the requester is or is not authenticated to received the service; and providing, by the computing device, the response to a gateway device for responding to the service request. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A method implemented by a computing device, the method comprising:
-
receiving, by the computing device and from an application used by a user device, a request for a service, where the user device is associated with an end user; determining, by the computing device, that the service request does not include an identifier of the end user; providing, by the computing device and to the application, an error message indicating that the identifier of the end user is missing; receiving, from the application and based on the error message, the identifier of the end user and a request for authenticating the end user; providing, by the computing device, the request to an authentication enabler for authenticating the end user based on the identifier of the end user; and receiving, by the computing device and based on the request, a valid authentication response from the authentication enabler. - View Dependent Claims (18, 19, 20)
-
Specification