×

Multiple security token transactions

  • US 8,225,385 B2
  • Filed: 03/23/2006
  • Issued: 07/17/2012
  • Est. Priority Date: 03/23/2006
  • Status: Expired due to Fees
First Claim
Patent Images

1. One or more computer-readable storage media, wherein the computer-readable storage media exclude propagating carrier waves, the computer-readable storage media storing computer-executable instructions that, when executed, cause one or more processors to perform operations for transferring a plurality of security tokens comprising:

  • receiving a request from at least one client for communication by an authentication service requesting the plurality of security tokens, each security token configured to prove an identity of the at least one client at a respective service provider, the request configured according to a web service trust protocol that is extended with syntax to support a multiple security token transaction and to enable inclusion of multiple error nodes in a response to the request by separately handling authentication errors for each security token of the plurality of security tokens, each of the multiple error nodes indicating an authorization state and a request state associated with a respective security token of the plurality of security tokens;

    generating the plurality of security tokens by the authentication service;

    sending the plurality of security tokens to the at least one client via a single transaction between the authentication service and the at least one client, the plurality of security tokens comprising an authentication token configured to prove the identity of the at least one client at the authentication service;

    receiving the authentication token by the authentication service to prove the identity of the at least one client to provide one or more other security tokens;

    confirming the identity of the at least one client based on the authentication token;

    determining one or more service providers that the at least one client is authorized to access, the one or more service providers configured to provide a suite of resources based on the identity of the at least one client; and

    generating the one or more other security tokens, each of the one or more other security tokens configured to prove identity of the at least one client at the one or more service providers.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×