LATE BINDING AUTHENTICATION
First Claim
Patent Images
1. A method, comprising:
- receiving, by a device, a request for authenticating a resource for access to a service;
generating a late-binding token (LBT) that is associated with the request;
sending the LBT to a second device associated with the resource;
binding the resource to the LBT upon receipt and validation of the LBT, the LBT received back from the second device; and
communicating a message to the second device that binding is complete and that the resource can access and is capable of authenticating to the service for access with a supplied valid authentication response.
3 Assignments
0 Petitions
Accused Products
Abstract
A late-binding token (LBT) is securely generated and provided to a device application. When the LBT is presented and validated, a resource associated with the presentation is bound to the LBT and authenticated for access to a service and provided valid credentials for accessing that service.
8 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a device, a request for authenticating a resource for access to a service; generating a late-binding token (LBT) that is associated with the request; sending the LBT to a second device associated with the resource; binding the resource to the LBT upon receipt and validation of the LBT, the LBT received back from the second device; and communicating a message to the second device that binding is complete and that the resource can access and is capable of authenticating to the service for access with a supplied valid authentication response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising:
-
requesting, by a device, an access session with a remote service of a second device; receiving an authentication token and a late-binding token (LBT); sending to an identity provider of a third device;
a resource identifier for a resource requesting access to the service, the authentication token, and the LBT;obtaining from the identity provider a message indicating that the LBT for the resource is bound to the authentication token; and acquiring a valid authentication response from the identity provider for the resource to participate in the access session with the service as an authenticated resource. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A system, comprising:
-
a processor; a late-binding authenticator configured and adapted to;
i) execute on the processor and ii) provide authentication of a resource authenticated to the late-binding authenticator with authentication credentials to a service using a late-binding token (LBT) when the resource requests access to the service. - View Dependent Claims (20)
-
Specification