Request-specific authentication for accessing Web service resources
First Claim
Patent Images
1. A computing system for controlling access to a protected Web service resource, the computing system comprising:
- a computer communication device for communicating across a communication network;
a processor communicatively connected to the communication device; and
memory storing program instructions, which when executed by the processor cause the computing system to;
receive a first request from a client to access the protected Web service resource from the communication network, the first request including an identification of the protected Web service resource and an identification of an operation to be performed on the protected Web service resource;
determine a level of the operation to be performed on the protected Web service resource identified in the first request;
determine that the client has been authenticated by an authentication service according to a first factor using a first authentication token offered by the client;
determine whether the first factor is of at least a first authentication level to grant the first request for the client to perform the operation, based on, at least in part, the level of the operation;
grant the first request to access the protected Web service resource after determining that the client has been authenticated according to the first factor, and that authentication according to the first factor is of at least the first authentication level;
receive a second request from the client to access the protected Web service resource from the communication network, the second request including the identification of the protected Web service resource and an identification of a second operation to be performed on the protected Web service resource;
determine a level of the second operation to be performed on the protected Web service resource identified in the second request;
send, to the client, a message to deny the second request to access the protected Web service resource based on, at least in part, the level of the second operation and on the authentication according to the first factor not being of at least a second authentication level to grant the second request, the message further comprising an address of the authentication service;
determine that the client has been authenticated by the authentication service according to a second factor using a second authentication token offered by the client;
determine whether the second factor is of at least the second authentication level to grant the second request for the client to perform the second operation, based on, at least in part, the level of the second operation; and
grant the second request to access the protected Web service resource after determining that the client has been authenticated according to the second factor and that the authentication according to the second factor is of at least the second authentication level.
3 Assignments
0 Petitions
Accused Products
Abstract
Requests for access to Web service resources are evaluated based on the type of request that is received. Requests are not granted unless sufficient proof of authentication is provided to grant that request. An authentication service evaluates one or more factors to determine whether or not to authenticate the client. After being authenticated by the authentication service, proof of authentication is provided to the Web service, which grants access to the Web service resource.
32 Citations
18 Claims
-
1. A computing system for controlling access to a protected Web service resource, the computing system comprising:
-
a computer communication device for communicating across a communication network; a processor communicatively connected to the communication device; and memory storing program instructions, which when executed by the processor cause the computing system to; receive a first request from a client to access the protected Web service resource from the communication network, the first request including an identification of the protected Web service resource and an identification of an operation to be performed on the protected Web service resource; determine a level of the operation to be performed on the protected Web service resource identified in the first request; determine that the client has been authenticated by an authentication service according to a first factor using a first authentication token offered by the client; determine whether the first factor is of at least a first authentication level to grant the first request for the client to perform the operation, based on, at least in part, the level of the operation; grant the first request to access the protected Web service resource after determining that the client has been authenticated according to the first factor, and that authentication according to the first factor is of at least the first authentication level; receive a second request from the client to access the protected Web service resource from the communication network, the second request including the identification of the protected Web service resource and an identification of a second operation to be performed on the protected Web service resource; determine a level of the second operation to be performed on the protected Web service resource identified in the second request; send, to the client, a message to deny the second request to access the protected Web service resource based on, at least in part, the level of the second operation and on the authentication according to the first factor not being of at least a second authentication level to grant the second request, the message further comprising an address of the authentication service; determine that the client has been authenticated by the authentication service according to a second factor using a second authentication token offered by the client; determine whether the second factor is of at least the second authentication level to grant the second request for the client to perform the second operation, based on, at least in part, the level of the second operation; and grant the second request to access the protected Web service resource after determining that the client has been authenticated according to the second factor and that the authentication according to the second factor is of at least the second authentication level. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of controlling access to a protected Web service resource, the method comprising:
-
performing by a server; receiving a first request from a client to access the protected Web service resource from a communication network, the first request including an identification of the protected Web service resource and an identification of an operation to be performed on the protected Web service resource; determining a level of operation to be performed on the protected Web service resource identified in the first request; determining that the client has been authenticated by an authentication service according to a first factor using the first authentication token offered by the client; determining whether the first factor meets at least a first criterion to grant the first request for the client to perform the operation, based on, at least in part, the level of the operation; granting the first request to access the protected Web service resource after determining that the client has been authenticated according to the first factor, and that authentication according to the first factor meets at least the first criterion; receiving a second request from the client to access the protected Web service resource from the communication network, the second request including the identification of the protected Web service resource and an identification of a second operation to be performed on the protected Web service resource; determining a level of the second operation to be performed on the protected Web service resource identified in the second request; sending, to the client, a message to deny the second request to access the protected Web service resource based on, at least in part, the level of the second operation and on the authentication according to the first factor not meeting at least a second criterion to grant the second request, the message further comprising an address of the authentication service; determining that the client has been authenticated by the authentication service according to the second factor using a second authentication token offered by the client; determining whether the second factor meets at least the second criterion to grant the second request for the client to perform the second operation, based on, at least in part, the level of operation; and granting the second request to access the protected Web service resource after determining that the client has been authenticated according to the second factor and that authentication according to the second factor meets at least the second criterion. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer readable storage medium, which is not a signal, containing computer executable instructions which when executed by a computer cause the computer to:
-
receive a first request from a client to access a protected Web service resource from the communication network, the first request including an identification of the protected Web service resource and an identification of an operation to be performed on the protected Web service resource; determine a level of the operation to be performed on the protected Web service resource identified in the first request; determine that the client has been authenticated by an authentication according to the first factor using the first authentication token offered by a client; determine whether the first factor is of at least a first authentication level; grant the first request to access the protected Web service resource after determining that the client has been authenticated according to the first factor, and that authentication according to the first factor is of at least the first authentication level; receive a second request from the client to access the protected Web service resource from the communication network, the second request including the identification of the protected Web service resource and an identification of a second operation to be performed on the protected Web service resource; determine a level of the second operation to be performed on the protected Web service resource identified in the second request; send, to the client, a message to deny the second request to access the protected Web service resource based on, at least in part, the level of the second operation and on the authentication according to the first factor not being of at least a second authentication level to grant the second request, the message further including an address of the authentication service; determine that the client has been authenticated by the authentication service according to a second factor using a second authentication token offered by the client; determine whether the second factor is of at least the second authentication level; and grant the second request to access the protected Web service resource after determining that the client has been authenticated according to the second factor, and that authentication according to the second factor is of at least the second authentication level. - View Dependent Claims (18)
-
Specification