System and method for pool-based identity authentication for service access without use of stored credentials
First Claim
Patent Images
1. A method comprising:
- receiving, by a service provider from a service consumer, a service request representing a request to access a service;
authenticating the service consumer based on a combination of provisioning information and independently verifiable data, the independently verifiable data not provided by the request to access the service, the provisioning information representing deployment configuration information;
determining the service consumer is authorized to access the service; and
providing, by the service provider, the service to the service consumer.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method in an example embodiment includes providing provisioning information for storage in a provisioning repository; receiving a service request from a service consumer, the service request including requestor identifying information; generating an authentication request to send to an authentication authority, the authentication request including requestor identifying information; receiving validation of an authenticated service request from the authentication authority; and providing the requested service to the service consumer.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, by a service provider from a service consumer, a service request representing a request to access a service; authenticating the service consumer based on a combination of provisioning information and independently verifiable data, the independently verifiable data not provided by the request to access the service, the provisioning information representing deployment configuration information; determining the service consumer is authorized to access the service; and providing, by the service provider, the service to the service consumer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
a memory device for storing instructions; and a processor, which, when executing the instructions, causes the system to perform operations comprising; receiving, by a service provider from a service consumer, a service request representing a request to access a service; authenticating the service consumer based on a combination of provisioning information and independently verifiable data, the independently verifiable data is not provided by the request to access the service, the provisioning information representing deployment configuration information; determining the service consumer is authorized to access the service; and providing, by the service provider, the service to the service consumer. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer readable non-transitory storage medium storing at least one program configured for execution by a computer, the at least one program comprising instructions to perform operations comprising:
-
receiving, by a service provider from a service consumer, a service request representing a request to access a service; authenticating the service consumer based on a combination of provisioning information and independently verifiable data, the independently verifiable data is not provided by the request to access the service, the provisioning information representing deployment configuration information; determining the service consumer is authorized to access the service; and providing, by the service provider, the service to the service consumer. - View Dependent Claims (20)
-
Specification