HTTP authentication and authorization management
First Claim
1. A computer implemented method, comprising:
- receiving at a processing node a current public epoch key of a current epoch key pair, wherein one attribute of the current public epoch key is a current key epoch ID that identifies the current epoch of the current public epoch key;
receiving at the processing node authorized user data associated with a request for content from an external system from a user, the external system is external from the user and the processing node, the authorized user data comprises authentication data and authorization data from the user, wherein the authentication data relates to validation the user'"'"'s identity, and wherein the authorization data relates to eligibility of the user to complete an action;
decrypting at the processing node the authorized user data using the public epoch key;
determining if the decryption of the authorized user data was successful;
if the decryption of the authorized user data was successful, identifying at the processing node a user epoch ID from the decrypted authorized user data;
comparing at the processing node the user epoch ID to the current key epoch ID of the current public epoch key;
determining at the processing node whether the user epoch ID is a valid epoch ID to determine validity of the authentication data and authorization data;
if the user epoch ID is a valid epoch ID, processing the decrypted user data and the request.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods and apparatus for a distributed security that provides authentication and authorization management. The system can include an epoch processor that is used to validate authentication and authorization data that is valid only for an epoch. The epoch processor can maintain a public key that can be used to decrypt the authentication and authorization data during the epoch that the key is valid. The epoch processor can receive a new public key during each epoch. The epoch processor can also determine if the authentication or authorization data was fraudulently generated based on the contents of the data, and verifying whether the data is valid for the epoch in which it was decrypted.
40 Citations
20 Claims
-
1. A computer implemented method, comprising:
-
receiving at a processing node a current public epoch key of a current epoch key pair, wherein one attribute of the current public epoch key is a current key epoch ID that identifies the current epoch of the current public epoch key; receiving at the processing node authorized user data associated with a request for content from an external system from a user, the external system is external from the user and the processing node, the authorized user data comprises authentication data and authorization data from the user, wherein the authentication data relates to validation the user'"'"'s identity, and wherein the authorization data relates to eligibility of the user to complete an action; decrypting at the processing node the authorized user data using the public epoch key; determining if the decryption of the authorized user data was successful; if the decryption of the authorized user data was successful, identifying at the processing node a user epoch ID from the decrypted authorized user data; comparing at the processing node the user epoch ID to the current key epoch ID of the current public epoch key; determining at the processing node whether the user epoch ID is a valid epoch ID to determine validity of the authentication data and authorization data; if the user epoch ID is a valid epoch ID, processing the decrypted user data and the request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising software stored in a non-transitory computer readable medium and comprising instructions executable by a data processing system and upon such execution cause the data processing system to perform operations comprising:
-
receiving a current public epoch key of a current epoch key pair, wherein one attribute of the current public epoch key is a current key epoch ID that identifies the current epoch of the current public epoch key; receiving, from a user, a request for content from an external system relative to the data processing system and authorized user data associated with the request, the authorized user data comprises authentication data and authorization data from the user, wherein the authentication data relates to validation the user'"'"'s identity, and wherein the authorization data relates to eligibility of the user to complete an action; decrypting the authorized user data using the public epoch key; identifying a user epoch ID from the decrypted authorized user data; determining if the user epoch ID is a valid epoch ID to determine validity of the authentication data and authorization data; and if the user epoch ID is a valid epoch ID, processing the decrypted user data and the request. - View Dependent Claims (17, 18, 19)
-
-
20. A system, comprising:
-
one or more authority nodes; one or more processing nodes communicatively coupled to a network and to the one or more authority nodes; wherein the one or more processing nodes are configured to; receive, from the one or more authority nodes, a current public epoch key of a current epoch key pair, wherein one attribute of the current public epoch key is a current key epoch ID that identifies the current epoch of the current public epoch key; receive, from a user over the network, a request for content from an external system relative to the authority nodes and the processing nodes and authorized user data associated with the request, the authorized user data comprises authentication data and authorization data from the user, wherein the authentication data relates to validation the user'"'"'s identity, and wherein the authorization data relates to eligibility of the user to complete an action; decrypt the authorized user data using the public epoch key; identify a user epoch ID from the decrypted authorized user data; determine if the user epoch ID is a valid epoch ID to determine validity of the authentication data and authorization data; and if the user epoch ID is a valid epoch ID, process the decrypted user data and the request.
-
Specification