×

Maintaining authentication states for resources accessed in a stateless environment

  • US 7,421,730 B2
  • Filed: 05/09/2002
  • Issued: 09/02/2008
  • Est. Priority Date: 05/09/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. In a computer system that is network connectable to a network and that may receive requests via stateless protocols, wherein received requests may be requests to access resources included in the computer system, a method for validating authentication information that is associated with a request to access a resource so as to determine the state of the resource, the method comprising:

  • receiving a request via a stateless protocol to access a resource that requires authentication information inherent to access control mechanisms of the stateless protocol; and

    using the authentication information inherent to access control mechanisms of the stateless protocol and resource access requirements attributes for determining a session state for access to the resource;

    determining validation information, the validation information being distinct from the authentication information, the validation information containing information other than authentication information and the validation information incorporating the previously determined session state information, and wherein the validation information is subsequently used with the distinct authentication information to determine whether access to the resource should be granted;

    setting the validation information within the system requesting access to the resource;

    the requesting system sending the previously set validation information and sending the authentication information inherent to access control mechanisms of the stateless protocol with a subsequent request to access a resource included in the computer system;

    using the previously set validation information and the authentication information inherent to the stateless protocol'"'"'s access control mechanisms to determine a session state; and

    using the validation information and the authentication information inherent to access control mechanisms of the stateless protocol to determine if access to the resource is to be granted wherebyif and only if both the validation information is appropriate for accessing the resource and the authentication information is appropriate for accessing the resource, then access to the resource is granted, butif either the validation information is not appropriate for accessing the resource or if the authentication information is not appropriate for accessing the resource, then access to the resource is not granted.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×