Verifying Requests for Access to a Service Provider Using an Authentication Component
First Claim
1. In a computing environment, a method performed at least in part on at least one processor, comprising:
- processing at least one verification request for accessing a service provider, including examining at least one security token, wherein each of the at least one security token and a public key is configured using at least one user identifier, accessing an authentication component that is generated using at least one revoked security token or at least one valid security token, and applying the authentication component to the public key to verify the security token, wherein the authentication component is configured to prove validity of the at least one security token.
3 Assignments
0 Petitions
Accused Products
Abstract
The subject disclosure is directed towards processing requests for accessing a service provider. After examining at least one security token, a public key and a portion of attribute information are identified. An authentication component is accessed and applied to the public key. A unique user identifier is employed in generating the public key. The authentication component is generated using information from at least one revoked security token or at least one valid security token. The authentication component is configured to prove validity of the at least one security token.
-
Citations
20 Claims
-
1. In a computing environment, a method performed at least in part on at least one processor, comprising:
processing at least one verification request for accessing a service provider, including examining at least one security token, wherein each of the at least one security token and a public key is configured using at least one user identifier, accessing an authentication component that is generated using at least one revoked security token or at least one valid security token, and applying the authentication component to the public key to verify the security token, wherein the authentication component is configured to prove validity of the at least one security token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. In a computing environment, a system, comprising:
a verification mechanism coupled to an authentication service for issuing at least one security token and computing an authentication component using a private key associated with the at least one user identifier and at least one private key associated with at least one revoked security token or at least one valid security token, wherein the at least one security token is configured using at least one user identifier, and wherein the verification mechanism is configured to apply the authentication component to a public key associated with the at least one user identifier to provide validity of the at least one security token. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
17. One or more computer-readable media having computer-executable instructions, which when executed perform steps, comprising:
-
processing a security token from at least one user; accessing an authentication component associated with the security token, wherein each of the at least one security token and the public key is generated using at least one user identifier; and accessing an authentication component for proving validity of the at least one security token to the service provider, wherein the authentication component is generated using at least one user identifier associated with at least one revoked security token or at least one valid security token and at least a portion of the attribute information. - View Dependent Claims (18, 19, 20)
-
Specification