×

Protecting user credentials using an intermediary component

  • US 8,984,597 B2
  • Filed: 05/27/2010
  • Issued: 03/17/2015
  • Est. Priority Date: 05/27/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented by an intermediary component, the method comprising:

  • receiving, by the intermediary component and from an access component, a first request to access a service or resource without user credentials of a current user of the access component being revealed to the access component;

    receiving, by the intermediary component, the user credentials of the current user of the access component, the intermediary component comprising a user credential management module and a user authentication module;

    obtaining, by the intermediary component and in response to the first request, the user credentials for the current user, wherein the user credentials are associated with the service or resource, and the user credentials are managed by the user credential management module;

    identifying, by the user authentication module, the user credentials to provide to the service;

    sending, by the user authentication module of the intermediary component and to the service or resource, both a second request to access the service or resource and the user credentials;

    receiving, by the intermediary component and in response to the second request, session state information from the service or resource; and

    returning, by the intermediary component, the session state information to the access component so that the access component and the service or resource can communicate with each other independently of the intermediary component.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×