×

Trusted database authentication through an untrusted intermediary

  • US 8,555,351 B2
  • Filed: 09/29/2008
  • Issued: 10/08/2013
  • Est. Priority Date: 09/29/2008
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implementable method for authenticating a user to a data source, comprising:

  • receiving a request to provide information on behalf of a user;

    requesting the submission of user authentication credentials in a desired format;

    receiving the requested user authentication credentials, the user authentication credentials generated in the desired format by a security token service;

    validating the received user authentication credentials with the security token service, the validation performed by a back-end service; and

    providing the requested information, the providing being based on successfully validating the received user authentication credentials; and

    whereinthe receiving a request to provide information is to an intermediary;

    the receiving the requested user authentication credentials is from the intermediary; and

    ,the providing the requested information is to the intermediary; and

    whereinthe intermediary comprises a mashup, the mashup combining content in various formats and from multiple sources for presentation as a Web page.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×