×

Policy-based authentication

  • US 8,978,100 B2
  • Filed: 03/14/2011
  • Issued: 03/10/2015
  • Est. Priority Date: 03/14/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented by a computing device, the method comprising:

  • receiving, by the computing device, a request to authenticate an end user of a user device based on a requested use of an application by the user device, wherein the request is received from an application server device that hosts the application, wherein the request includes an application identifier for the application and an end user identifier for the end user;

    evaluating, by the computing device, policies for the end user identifier to determine what type of authentication is required for the end user identifier;

    evaluating, by the computing device, policies for the application identifier to determine what type of authentication is required for the application identifier;

    providing, by the computing device, an authentication request to an authentication enabler device, wherein the authentication request includes an authentication context specifying a required type of authentication determined based on the evaluations;

    forwarding, by the computing device, the request to another enabler device requested by the request;

    receiving, by the computing device and from the other enabler device, results of performance of functions performed by the other enabler device;

    receiving, by the computing device and from the authentication enabler device, a response indicating that the end user is or is not authenticated to use the application; and

    providing, by the computing device, the response to the application server device hosting the application.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×