SYSTEM AND METHOD FOR POOL-BASED IDENTITY AUTHENTICATION FOR SERVICE ACCESS WITHOUT USE OF STORED CREDENTIALS
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented system and method for pool-based identity authentication for service access without use of stored credentials is disclosed. The method in an example embodiment includes providing provisioning information for storage in a provisioning repository; receiving a service request from a service consumer, the service request including requestor identifying information; generating an authentication request to send to an authentication authority, the authentication request including requestor identifying information; receiving validation of an authenticated service request from the authentication authority; and providing the requested service to the service consumer.
-
Citations
21 Claims
-
1. (canceled)
-
2. A method comprising:
-
receiving, by a service provider from a service consumer, a service request representing a request to access a service; authenticating the service consumer based on a combination of provisioning information and independently verifiable data, the independently verifiable data not provided by the request to access the service, the provisioning information representing deployment configuration information; determining the service consumer is authorized to access the service; and providing, by the service provider, the service to the service consumer. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 13, 14, 15, 16, 17)
-
-
11. A system comprising:
-
a memory device for storing instructions; and a processor, which, when executing the instructions, causes the system to perform operations comprising; receiving, by a service provider from a service consumer, a service request representing a request to access a service; authenticating the service consumer based on a combination of provisioning information and independently verifiable data, the independently verifiable data is not provided by the request to access the service, the provisioning information representing deployment configuration information; determining the service consumer is authorized to access the service; and providing, by the service provider, the service to the service consumer. - View Dependent Claims (12, 18, 19)
-
-
20. A computer readable non-transitory storage medium storing at least one program configured for execution by a computer, the at least one program comprising instructions to perform operations comprising:
-
receiving, by a service provider from a service consumer, a service request representing a request to access a service; authenticating the service consumer based on a combination of provisioning information and independently verifiable data, the independently verifiable data is not provided by the request to access the service, the provisioning information representing deployment configuration information; determining the service consumer is authorized to access the service; and providing, by the service provider, the service to the service consumer. - View Dependent Claims (21)
-
Specification