FACILITATING USER-CENTRIC IDENTITY MANAGEMENT
First Claim
1. One or more computer storage media storing computer-useable instructions that, when used by one or more computing devices, cause the one or more computing devices to perform operations comprising:
- prior to accessing one or more resources stored in association with an identity provider, providing an indication from a service provider to a user device that access to the one or more resources is to be provided to a service provider; and
communicating with the identity provider to access the one or more resources.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present invention provide systems, methods, and computer storage media for facilitating user-centric identity management. In this regard, various aspects of identity management are designed to be more transparent to users to bolster user assurance with respect to “behind-the-scenes” procedures of identity management. Generally, indications of data flow between service providers, identity providers, and/or user devices can be provided to the user device for presentation to the user. As a result, visual representations of data flow, notifications of data flow, or the like, can be presented to the user to expose various aspects of identity management. In some embodiments, users may be able to control aspects of identity management, for example, by confirming or preventing data flow between providers.
-
Citations
20 Claims
-
1. One or more computer storage media storing computer-useable instructions that, when used by one or more computing devices, cause the one or more computing devices to perform operations comprising:
-
prior to accessing one or more resources stored in association with an identity provider, providing an indication from a service provider to a user device that access to the one or more resources is to be provided to a service provider; and communicating with the identity provider to access the one or more resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computerized method comprising:
-
in accordance with a first communication between a service provider that provides a service to a user device and a third-party identity provider that authorizes access to resources associated with a user of the user device, providing an indication of the first communication to the user device to expose the first communication between the service provider and the third-party identity provider to the user of the user device; and in accordance with a second communication between the service provider and the third-party identity provider, providing an indication of the second communication to the user device to expose the second communication between the service provider and the third-party identity provider to the user of the user device, wherein the first communication and the second communication between the service provider and the third-party identity provider facilitate access to one or more resources stored in association with the third-party identity provider being provided to the service provider. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
one or more processors; and one or more computer storage media storing computer-useable instructions that, when used by the one or more processors, cause the one or more processors to; communicate data to a user device for use in rendering a visual representation of at least a portion of a data flow between the user device, a service provider, and an identity provider, wherein the service provider provides a service to the user device and the identity provider authenticates a user of the user device and authorizes the service provider to access resources stored in association with the identity provider; and communicate to the user device an indication of a set of one or more resources provided to or to be provided to the service provider from the identity provider in accordance with the identity provider authorizing access to the service provider. - View Dependent Claims (18, 19, 20)
-
Specification