×

Transaction authorization

  • US 8,250,627 B2
  • Filed: 07/28/2008
  • Issued: 08/21/2012
  • Est. Priority Date: 07/28/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method for transaction authorization within a security service, the computer-implemented method comprising:

  • receiving a request, by a reverse proxy server, from a requestor for an authorized transaction of an application;

    presenting the requestor to a confirmation page of the application;

    submitting a confirmed transaction request to the application;

    intercepting by a computer the confirmed transaction request by the security service, wherein a transaction identifier is cached to form a cached transaction identifier;

    requesting by the computer the requestor to authenticate to form an authentication request;

    placing the cached transaction identifier into the authentication request;

    determining by the computer whether the requestor was authenticated;

    responsive to a determination the requestor authenticated, receiving authentication information-comprising an associated transaction identifier;

    determining whether the cached transaction identifier is equivalent to the authentication information; and

    responsive to a determination that the cached transaction identifier is equivalent to authentication information, passing the request with the cached transaction identifier in the request to an application.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×