×

Methods and systems of generating and using authentication credentials for decentralized authorization in the cloud

  • US 9,397,990 B1
  • Filed: 11/08/2013
  • Issued: 07/19/2016
  • Est. Priority Date: 11/08/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method of controlling the sharing of data between entities that are in electronic communication, comprising:

  • generating, by a cloud-based server of a target service, an authentication credential comprising;

    an identifier for the target service, anda unique signature representing a keyed-hash message authentication code generated using a key identifier and a secret key associated with the target service; and

    by an intermediate service;

    attenuating the authentication credential by placing one or more restrictions on a use of the authentication credential,generating an updated unique signature for the authentication credential wherein the updated unique signature represents a keyed-hash message authentication code that is generated using the unique signature and the one or more restrictions,replacing the unique signature of the authentication credential with the updated unique signature, andproviding the authentication credential to a client electronic device that is in electronic communication with the cloud-based server only when the client electronic device is authorized to access the target service;

    by the cloud-based server of the target service;

    receiving an access request from the client electronic device, wherein the request comprises the authentication credential and one or more parameters that relate to a requested service that is available from the target service,identifying that the authentication credential includes the updated unique signature and a third party caveat that is associated with a third party authentication service,in response to the identifying, determining whether the request also comprises a discharge credential for the third party caveat, andin response to determining that the request includes the discharge credential;

    identifying a signature for the discharge credential, anddetermining whether the signature for the discharge credential corresponds to a signature for the third party authentication service, andproviding the client electronic device with the requested service only when the signature for the discharge credential corresponds to the signature for the third party authentication service, otherwise denying the request.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×