AUTHENTICATION AND AUTHORIZATION WITH A BUNDLED TOKEN
First Claim
Patent Images
1. A computer-implemented method, comprising:
- receiving a request to access a resource; and
determining whether the request includes a bundled token encapsulating two or more security tokens in a single security token.
3 Assignments
0 Petitions
Accused Products
Abstract
Authentication and authorization can be performed with a bundled token, which encapsulates two or more security tokens in a single security token. The bundled token can be supplied in response to a request for a token from a token service, for example. Subsequently, the bundled token can be sent in conjunction with a request for resource access, wherein more than one token is required to access the resource.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving a request to access a resource; and determining whether the request includes a bundled token encapsulating two or more security tokens in a single security token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a processor coupled to a memory, the processor configured to execute the following computer-executable components stored in the memory; a first component configured to control access to a private network resource as a function of a bundled token that comprises a network-access security token and a resource security token embedded within a single security token. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computer-readable storage medium having instructions stored thereon that enable at least one processor to perform a method upon execution of the instructions, the method comprising:
-
receiving a request for a security token; and generating a bundled token comprising two or more security tokens embedded in a single security token in response to the request. - View Dependent Claims (18, 19, 20)
-
Specification