Policy-based authentication
First Claim
Patent Images
1. A method implemented by a computing device, the method comprising:
- receiving, by the computing device, a request to authenticate an end user of a user device based on a requested use of an application by the user device, wherein the request is received from an application server device that hosts the application, wherein the request includes an application identifier for the application and an end user identifier for the end user;
evaluating, by the computing device, policies for the end user identifier to determine what type of authentication is required for the end user identifier;
evaluating, by the computing device, policies for the application identifier to determine what type of authentication is required for the application identifier;
providing, by the computing device, an authentication request to an authentication enabler device, wherein the authentication request includes an authentication context specifying a required type of authentication determined based on the evaluations;
forwarding, by the computing device, the request to another enabler device requested by the request;
receiving, by the computing device and from the other enabler device, results of performance of functions performed by the other enabler device;
receiving, by the computing device and from the authentication enabler device, a response indicating that the end user is or is not authenticated to use the application; and
providing, by the computing device, the response to the application server device hosting the application.
2 Assignments
0 Petitions
Accused Products
Abstract
A device receives a request to authenticate an end user of a user device based on a requested use of an application by the user device, and communicates with an authentication client, provided in the user device, to perform an authentication requested by the request. The device also generates a response to the request based on the communication with the authentication client, where the response indicates that the end user is or is not authenticated to use the application. The device further provides the response to an application server device hosting the application.
-
Citations
19 Claims
-
1. A method implemented by a computing device, the method comprising:
-
receiving, by the computing device, a request to authenticate an end user of a user device based on a requested use of an application by the user device, wherein the request is received from an application server device that hosts the application, wherein the request includes an application identifier for the application and an end user identifier for the end user; evaluating, by the computing device, policies for the end user identifier to determine what type of authentication is required for the end user identifier; evaluating, by the computing device, policies for the application identifier to determine what type of authentication is required for the application identifier; providing, by the computing device, an authentication request to an authentication enabler device, wherein the authentication request includes an authentication context specifying a required type of authentication determined based on the evaluations; forwarding, by the computing device, the request to another enabler device requested by the request; receiving, by the computing device and from the other enabler device, results of performance of functions performed by the other enabler device; receiving, by the computing device and from the authentication enabler device, a response indicating that the end user is or is not authenticated to use the application; and providing, by the computing device, the response to the application server device hosting the application. - View Dependent Claims (2, 9, 10, 11, 12, 13, 14)
-
-
3. A method implemented by a computing device, the method comprising:
-
receiving, by the computing device, a request to authenticate an end user of a user device based on a requested use of an application by the user device, wherein the request is received from an application server device that hosts the application, and wherein the request includes an application identifier and an end user identifier; evaluating, by the computing device, policies for the end user identifier to determine what type of authentication is required for the end user identifier; evaluating, by the computing device, policies for the application identifier to determine what type of authentication is required for the application identifier; retrieving, by the computing a token associated with the application and end user identifiers; determining, by the computing device, whether the token is present and valid; providing, by the computing device and to the application server device hosting the application, when the token is present and valid, a response indicating that the end user is or is not authenticated to use the application; providing, by the computing device and when the token is not present or is invalid, an authentication request to an authentication enabler device, wherein the authentication request includes an authentication context specifying a required type of authentication determined based on the evaluations; receiving, by the computing device and from the authentication enabler device, a response indicating whether the end user is authenticated to use the application; and providing, by the computing device, the response to the application server device. - View Dependent Claims (4, 5)
-
-
6. A method implemented by a computing device, the method comprising:
-
receiving, by the computing device and from an application server device hosting an application being used by a user device, a request for a service provided by the application for the user device, wherein the request includes an application identifier; determining, by the computing device, that the request does not include an identifier of the end user; providing, by the computing device and to the application server device, an error message indicating that the identifier of the end user is missing; receiving, by the computing device and from the application server device, based on the error message, the identifier of the end user and a request for authenticating the end user; evaluating, by the computing device, policies for the identifier of the end user to determine what type of authentication is required for the identifier of the end user; evaluating, by the computing device, policies for the application identifier to determine what type of authentication is required for the application identifier; providing, by the computing device, an authentication request to an authentication enabler, wherein the authentication request includes an authentication context specifying a required type of authentication determined based on the evaluations, wherein the authentication enabler; receives the request for authenticating the end user, determines whether a token associated with the end user is present in a database, validates the token when the token is present in the database, generates the valid authentication response when the token is present in the database, and provides the valid authentication response to the computing device; and receiving, by the computing device and based on the authentication request, a valid authentication response from the authentication enabler. - View Dependent Claims (7, 8, 15, 16, 17, 18, 19)
-
Specification