CENTRALIZED AUTHENTICATION FOR MULTIPLE APPLICATIONS
First Claim
1. A network authentication system for authenticating requests for services that are delivered from a network data communication device and that are directed to different applications, each request being directed to one of the applications, comprising:
- a network communication interface configured to electronically receive the requests for services from the network data communication device and to electronically send requests for the services to the applications on behalf of the network data communication device; and
a data processing system configured to;
electronically authenticate each received request; and
cause the network communication interface to send each request for the service indicated by the received request on behalf of the network data communication device to the application if and only if the authentication is successful.
1 Assignment
0 Petitions
Accused Products
Abstract
Network applications can provide network security without containing any security code or otherwise verifying the authenticity of each request that they receive for service. Instead, a single, centralized network authentication system can be placed between the network applications and all devices requesting for services from them. The authenticity of each request for service can then be verified by the centralized network authentication system before the request is passed to the network application to which it is directed. Responses from the network applications may also be channeled back to the systems that made the requests through the centralized network authentication system.
26 Citations
20 Claims
-
1. A network authentication system for authenticating requests for services that are delivered from a network data communication device and that are directed to different applications, each request being directed to one of the applications, comprising:
-
a network communication interface configured to electronically receive the requests for services from the network data communication device and to electronically send requests for the services to the applications on behalf of the network data communication device; and a data processing system configured to; electronically authenticate each received request; and cause the network communication interface to send each request for the service indicated by the received request on behalf of the network data communication device to the application if and only if the authentication is successful. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. Non-transitory, tangible, computer-readable storage media containing a program of instructions configured to cause a network authentication system running the program of instructions to authenticate requests for services that are delivered from a wireless mobile communication device and that are directed to different applications, each request being directed to one of the applications, by:
-
electronically receiving the requests for services from the network data communication device and to electronically send requests for the services to the applications on behalf of the network data communication device; electronically authenticating each received request; and electronically sending each request for the service requested indicated by each received request on behalf of the network data communication device to the application if and only if the authentication is successful. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification