×

Automatic detection of authentication methods by a gateway

  • US 9,794,227 B2
  • Filed: 03/07/2014
  • Issued: 10/17/2017
  • Est. Priority Date: 03/07/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method for implementing an authentication mechanism at a gateway comprising:

  • receiving a request for a first resource and a request for a second resource at the gateway;

    analyzing, at the gateway, each of the request for the first resource and the request for the second resource for an indication that the first resource or the second resource requires authentication, wherein analyzing the request is performed without comparing the first resource or the second resource to a list of resources;

    when the request for the first resource is determined at the gateway to contain an indication that the first resource requires authentication, thenaccessing an authentication rules database to identify an authentication process associated with the indication that the first resource requires authentication,executing the authentication process associated with the indication that the first resource requires authentication, andforwarding from the gateway the request to the first resource following the execution of the authentication process;

    when the request for the second resource is determined at the gateway to contain an indication that the second resource requires authentication, thenaccessing the authentication rules database to identify an authentication process associated with the indication that the second resource requires authentication,executing the authentication process associated with the indication that the second resource requires authentication, andforwarding from the gateway the request to the first resource following the execution of the authentication process; and

    when the request for the first resource is determined at the gateway not to contain the indication that the first resource requires authentication, then forwarding from the gateway the request to the first resource without execution of the authentication process; and

    wherein the preceding steps are performed by at least one processor.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×