Security Token Caching in Centralized Authentication Systems
First Claim
Patent Images
1. A method comprising:
- receiving, by a client device, a security token from an authentication server based on user credentials submitted to the authentication server;
sending, by the client device, the security token to an application server;
verifying, by the application server, the security token with the authentication server and determining whether to allow or deny access to the client device based on the security token verification;
determining, by the application server, a disposition of the security token based on whether the received security token is a single-use token or a multiple-use token;
associating, by the application server, the security token with a corresponding cache table based on the determined disposition of the token;
caching, by the application server, the security token based on the associated cache table; and
determining a time-expiry algorithm for the cache table based on the cached security token, the disposition of the security token, and associated cache table.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and devices for determining a time-expiry algorithm based on a cached and verified security token, a disposition of the security token, and a cache table, where the disposition of the security token is based on whether the received security token is a single-use token or a multiple-use token and where the cache table is selected from two separate cache tables.
45 Citations
18 Claims
-
1. A method comprising:
-
receiving, by a client device, a security token from an authentication server based on user credentials submitted to the authentication server; sending, by the client device, the security token to an application server; verifying, by the application server, the security token with the authentication server and determining whether to allow or deny access to the client device based on the security token verification; determining, by the application server, a disposition of the security token based on whether the received security token is a single-use token or a multiple-use token; associating, by the application server, the security token with a corresponding cache table based on the determined disposition of the token; caching, by the application server, the security token based on the associated cache table; and determining a time-expiry algorithm for the cache table based on the cached security token, the disposition of the security token, and associated cache table. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A device comprising:
a processor and addressable memory, the processor configured to; receive a security token from a client device; verify the security token with an authentication server and determine whether to allow or deny access to the client device based on the security token verification; determine a disposition of the security token based on whether the received security token is a single-use token or a multiple-use token; associate the security token with a corresponding cache table based on the disposition of the token, wherein the cache table is selected from two separate cache tables; cache the security token based on the associated cache table; and determine a time-expiry algorithm based on the cached security token, the disposition of the security token, and associated cache table. - View Dependent Claims (15, 16)
-
17. A centralized authentication system for security token caching, the centralized authentication system comprising:
-
a first computing device, wherein the first computing device comprises a processor and an addressable memory, the processor configured to; transmit a set of one or more user credentials associated with a user to a second computing device; receive a security token from the second computing device based on the one or more user credentials being authenticated successfully; and send the security token to a third computing device; the second computing device, wherein the second computing device comprising a processor and an addressable memory, the processor configured to; receive from the first computing device the set of one or more user credentials associated with the user; authenticate the received set of one or more user credentials; and validate a received security token of the user in response to a verification request from the third computing device; the third computing device, wherein the third computing device comprises a processor and an addressable memory, the processor configured to; verify the security token with the second computing device; determine whether to allow or deny access to the first computing device based on the security token verification; determine a disposition of the security token based on whether the received security token is a single-use token or a multiple-use token; associate the security token with a corresponding cache table based on the disposition of the token, wherein the cache table is selected from two separate cache tables; cache the security token based on the associated cache table; and determine a time-expiry algorithm based on the cached security token, the disposition of the security token, and associated cache table. - View Dependent Claims (18)
-
Specification