Verifying requests for access to a service provider using an authentication component
First Claim
1. In a computing environment, a method for processing at least one verification request for accessing a service provider, performed at least in part on at least one processor, the method comprising:
- examining at least one security token comprising a public key, wherein each of the at least one security token and the public key is configured using an identifier that uniquely identifies a particular user,accessing an authentication component comprising a proof, andapplying, by a verification mechanism, the authentication component to the public key to identify the proof as a non-membership proof, wherein the particular user is denied access to the service provider upon identifying the at least one security token as a member of a blacklist or the particular user is granted access to the service provider upon identifying the at least one security token is not a member of the blacklist.
2 Assignments
0 Petitions
Accused Products
Abstract
The subject disclosure is directed towards processing requests for accessing a service provider. After examining at least one security token, a public key and a portion of attribute information are identified. An authentication component is accessed and applied to the public key. A unique user identifier is employed in generating the public key. The authentication component is generated using information from at least one revoked security token or at least one valid security token. The authentication component is configured to prove validity of the at least one security token.
71 Citations
20 Claims
-
1. In a computing environment, a method for processing at least one verification request for accessing a service provider, performed at least in part on at least one processor, the method comprising:
-
examining at least one security token comprising a public key, wherein each of the at least one security token and the public key is configured using an identifier that uniquely identifies a particular user, accessing an authentication component comprising a proof, and applying, by a verification mechanism, the authentication component to the public key to identify the proof as a non-membership proof, wherein the particular user is denied access to the service provider upon identifying the at least one security token as a member of a blacklist or the particular user is granted access to the service provider upon identifying the at least one security token is not a member of the blacklist. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. In a computing environment, a system for processing at least one verification request for accessing a service provider, the system comprising:
-
a memory; and a processor programmed to; examine at least one security token comprising a public key, wherein each of the at least one security token and the public key is configured using an identifier that uniquely identifies a particular user, access an authentication component comprising a proof, and apply the authentication component to the public key to identify the proof as a non-membership proof, wherein the particular user is denied access to the service provider upon identifying the least one security token is not a member of a blacklist or the particular user is granted access to the service provider upon identifying the at least one security token is a member of the blacklist. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. One or more computer-readable storage devices having computer-executable instructions for processing at least one verification request for accessing a service provider, the computer-executable instructions which when executed perform operations comprising:
-
examining at least one security token comprising a public key, wherein each of the at least one security token and the public key is configured using an identifier that uniquely identifies a particular user, accessing an authentication component comprising a proof, and applying, by a verification mechanism, the authentication component to the public key to identify the proof as a non-membership proof, wherein the particular user is denied access to the service provider upon identifying the at least one security token as a member of a blacklist or the particular user is granted access to the service provider upon identifying the at least one security token is not a member of the blacklist. - View Dependent Claims (18, 19, 20)
-
Specification