SELECTIVE AUTHORIZATION BASED ON AUTHENTICATION INPUT ATTRIBUTES
First Claim
Patent Images
1. A method, comprising:
- receiving an authentication input at an authentication authority using an authentication protocol, the authentication input being associated with a client; and
providing one or more representations for the authentication input, each of the representations representing an attribute of the authentication input.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments for providing differentiated access based on authentication input attributes are disclosed. In accordance with one embodiment, a method includes receiving an authentication input at an authentication authority using an authentication protocol. The authentication input being associated with a client. The method also includes providing one or more representations for the authentication input, wherein each of the representations represents an attribute of the authentication input.
105 Citations
20 Claims
-
1. A method, comprising:
-
receiving an authentication input at an authentication authority using an authentication protocol, the authentication input being associated with a client; and providing one or more representations for the authentication input, each of the representations representing an attribute of the authentication input. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer readable medium having computer-executable instructions that, when executed, perform acts comprising:
-
receiving an authentication input at an authentication authority using an authentication protocol, the authentication input being associated with a client; and returning a token to the client using the authentication protocol, the token includes one or more representations, wherein each claim represents an attribute of the authentication input. - View Dependent Claims (17, 18, 19)
-
-
20. A system, the system comprising:
-
one or more processors; and memory to store a plurality of computer-executable instructions for execution by the one or more processors, the computer-executable instructions comprising; receiving an authentication input at an authentication authority using an authentication protocol, wherein the authentication input is associated with a client; and providing one or more representations for the authentication input, wherein each of the representations represents an attribute of the authentication input.
-
Specification