Method and system for authorizing access to user information in a network
First Claim
1. A method comprising:
- receiving a request at a network entity from a source for information of a user;
verifying, by the network entity, that the source is authorized to receive the information; and
generating, by the network entity, a response authorizing the request if the source is authorized to receive the information,wherein the verifying further comprises comparing the source of the request against non-barred public user identities of the user and comparing the source of the request against network entities identified in a path header contained in a previous request.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to a method and system for authorizing access to information of a user. The system includes a first network entity and a second network entity. The first network entity sends a request for information of a user to the second network entity. The second network entity receives the request for information of the user, verifies that the first network entity is authorized to receive the requested information, and generates a response authorizing the request if the first network entity is authorized to receive the information. The verifying may include comparing the first network entity against all non-barred public user identities of the user, comparing the first network entity against all network entities identified in a previous request, and comparing the first network entity against all application servers not belonging to third-party providers outside a network to which the user is connected.
12 Citations
34 Claims
-
1. A method comprising:
-
receiving a request at a network entity from a source for information of a user; verifying, by the network entity, that the source is authorized to receive the information; and generating, by the network entity, a response authorizing the request if the source is authorized to receive the information, wherein the verifying further comprises comparing the source of the request against non-barred public user identities of the user and comparing the source of the request against network entities identified in a path header contained in a previous request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An apparatus comprising:
-
a receiver configured to receive a request from a source for information of a user; a verifier configured to verify that the source is authorized to receive the information, wherein the verifier is further configured to compare the source of the request against non-barred public user identities of the user, compare the source of the request against network entities identified in a path header contained in a previous request; and a generator configured to generate a response authorizing the request if the source is authorized to receive the information. - View Dependent Claims (15, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
16. A system comprising:
-
a first network entity, the first network entity configured to send a request for information of a user; and a second network entity, the second network entity configured to receive the request for information of the user, to verify that the first network entity is authorized to receive the requested information by comparing the source of the request against non-barred public user identities of the user and by comparing the source of the request against network entities identified in a path header contained in a previous request, and to generate a response authorizing the request if the first network entity is authorized to receive the information. - View Dependent Claims (28, 29)
-
-
17. An apparatus comprising:
-
receiving means for receiving a request at a network entity from a source for information of a user; verifying means for verifying that the source is authorized to receive the information; and generating means for generating a response authorizing the request if the source is authorized to receive the information, wherein the verifying means further comprises comparing means for comparing the source of the request against non-barred public user identities of the user and for comparing the source of the request against network entities identified in a path header contained in a previous request. - View Dependent Claims (30, 31)
-
-
32. A computer program, stored on a computer readable medium, the computer program configured to control a processor to perform a method comprising:
-
receiving a request at a network entity from a source for information of a user; verifying that the source is authorized to receive the information; and generating a response authorizing the request if the source is authorized to receive the information, wherein the verifying further comprises comparing the source of the request against non-barred public user identities of the user and comparing the source of the request against network entities identified in a path header contained in a previous request. - View Dependent Claims (33, 34)
-
Specification