×

Methods and systems for authentication through multiple proxy servers that require different authentication data

  • US 6,839,761 B2
  • Filed: 04/19/2001
  • Issued: 01/04/2005
  • Est. Priority Date: 04/19/2001
  • Status: Expired due to Term
First Claim
Patent Images

1. In a network configuration that includes a client computer system, a server computer system and a plurality of proxy computer systems that the client computer system would need to communicate through in order to communicate with the server computer system, the plurality of proxy computer systems including at least a first proxy that requires authentication using first authentication data and a second proxy that requires authentication using second authentication data, a method of the client computer system transmitting a request to the server computer system notwithstanding that the first and second proxies require different authentication data, the method comprising the following:

  • an act of the client computer system dispatching a first request for a service through the first proxy;

    an act of the client computer system receiving a first authentication request from the first proxy;

    an act of the client computer system retrieving first authentication data associated with the first proxy;

    an act of the client computer system dispatching a second request for the service, the second request including the first authentication data;

    an act of the client computer system receiving a second authentication request from the second proxy, the first proxy using the first authentication data to authenticate the client computer system and forwarding the second request for the service to the second proxy, the second proxy then receiving the second request for the service;

    an act of the client computer system retrieving second authentication data associated with the second proxy; and

    an act of the client computer system dispatching a third request for the service to the server computer system, the third request including the first authentication data and the second authentication data, the first proxy using the first authentication data to authenticate the client computer system and thereafter forwarding the third request for the service to the second proxy, the second proxy using the second authentication data to authenticate the client computer system and thereafter forwarding the third request to the server computer system or to a third proxy that requires third authentication data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×