De-authenticating in security environments only providing authentication
First Claim
Patent Images
1. A method for de-authenticating from a first web server security realm protected by an authentication scheme lacking a de-authentication operation, the method comprising:
- attempting to access a first resource in a first security realm protected by the authentication scheme;
receiving a request for authentication credentials in response to said attempting to access the first resource;
supplying said authentication credentials in response to the request so as to become authenticated in the first security realm; and
accessing a logout resource in the first security realm, said logout resource configured to automatically authenticate with a second security realm such that accessing the logout resource results in de-authentication from the first security realm.
1 Assignment
0 Petitions
Accused Products
Abstract
In a protocol providing for authentication to a first security realm, but failing to provide for a logout operation to de-authenticate from the first security realm, a logout operation is effected by providing a logout button, hyperlink, or other linking construct that causes a user to be transparently authenticated to a second security realm. For example, with respect to HTTP basic authentication, authentication with the second security realm removes, or logs out, the user from the first security realm.
-
Citations
24 Claims
-
1. A method for de-authenticating from a first web server security realm protected by an authentication scheme lacking a de-authentication operation, the method comprising:
-
attempting to access a first resource in a first security realm protected by the authentication scheme; receiving a request for authentication credentials in response to said attempting to access the first resource; supplying said authentication credentials in response to the request so as to become authenticated in the first security realm; and accessing a logout resource in the first security realm, said logout resource configured to automatically authenticate with a second security realm such that accessing the logout resource results in de-authentication from the first security realm. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
attempting to access a first resource in a first security realm protected by basic authentication; responsive to said attempting to access, receiving an authentication request for controlling access to the first resource; supplying authentication credentials responsive to said authentication request so as to authenticate with the first security realm; accessing a second resource in the first security realm; and responsive to said accessing the second resource, automatically authenticating with a second security realm and de-authenticating with the first security realm. - View Dependent Claims (7, 8, 9)
-
-
10. An article of manufacture comprising a readable medium having instructions encoded thereon capable of directing a processor to perform:
-
attempting to access a first resource in a first security realm protected by the authentication scheme; receiving a request for authentication credentials in response to said attempting to access the first resource; supplying said authentication credentials in response to the request so as to become authenticated in the first security realm; and accessing a logout resource in the first security realm, said logout resource configured to automatically authenticate with a second security realm on accessing thereof and to de-authenticate from the first security realm. - View Dependent Claims (11, 12, 13, 14)
-
-
15. An article of manufacture comprising a readable medium having instructions capable of directing a the processor to perform:
-
attempting to access a first resource in a first security realm protected by basic authentication; responsive to said attempting to access, receiving an authentication request for controlling access to the first resource; supplying authentication credentials responsive to said authentication request so as to authenticate with the first security realm; accessing a second resource in the first security realm; and responsive to said accessing the second resource, automatically authenticating with a second security realm and de-authenticating from the first security realm. - View Dependent Claims (16, 17, 18)
-
-
19. An apparatus comprising:
-
means for attempting to access a first resource in a first security realm protected by the authentication scheme; means for receiving a request for authentication credentials in response to said attempting to access the first resource; means for supplying said authentication credentials in response to the request so as to become authenticated in the first security realm; and means for accessing a logout resource in the first security realm, said logout resource configured to automatically authenticate with a second security realm such that accessing the logout resource results in de-authentication from the first security realm. - View Dependent Claims (20)
-
-
21. An apparatus for de-authenticating from an HTTP basic authentication comprising:
-
means for attempting to access a first resource in a first security realm protected by HTTP basic authentication; responsive to said attempting to access, means for receiving an authentication request for controlling access to the first resource; means for supplying authentication credentials responsive to said authentication request so as to authenticate with the first security realm; means for accessing a second resource in the first security realm; and responsive to said accessing the second resource, means for automatically authenticating with a second security realm wherein said authentication results in automatically de-authenticating from the first security realm. - View Dependent Claims (22)
-
-
23. A de-authentication method for a web browser, comprising:
-
accessing a first resource of a first security realm of the web server with the web browser, the web browser operable to automatically cache authentication credentials for a current security realm to which the web browser is authenticated; receiving a request for authentication responsive to requesting the first resource; authenticating with the first security realm based at least in part on providing authentication credentials responsive to the request for authentication, so that the current security realm is first security realm; and de-authenticating from the first web server security realm based at least in part on accessing a second resource of a second security realm different from the first resource of the first security realm, so that the current security realm changes from the first security realm to the second security realm. - View Dependent Claims (24)
-
Specification