Distributed authentication user interface system
First Claim
1. A computer implemented method for authenticating a request to access a protected network resource, comprising:
- receiving the request to access the protected network resource at a first software object, the request originating from a web browser;
permitting access to the protected network resource by the first software object, if the request includes a required authentication token to access the protected network resource;
re-directing the request to a distributed software object by the first software object, if the request does not include the required authentication token to access the protected network resource, the distributed software object being protected by a first security layer;
translating the re-directed request into a client credentials requirement input call for an authentication service, by the distributed software object;
communicating the client credentials requirement input call by the distributed software object across a second security layer to the authentication service using a backchannel that only allows communication through the distributed software object, the first software object being prevented from accessing the authentication service, the authentication service being protected by the second security layer, the second security layer being behind the first security layer, wherein the authentication service resides in a distinct space that is separate from the space where the first software object, the distributed software object and the protected network resource reside;
requesting input from the authentication service specifying a required authentication solution by the distributed software object based on the client credentials requirement input call;
receiving the input from the authentication service to the distributed software object; and
arbitrating an authentication transaction sequence between the web browser and the authentication service based upon the received input, wherein arbitration between the web browser and the authentication service is only through the distributed software object without utilizing the first software object, wherein the arbitration includes,receiving a response with the required authentication solution by the distributed software object using the web browser, the response enabling issuance of a new authentication token by the authentication service to the distributed software object so as to allow the distributed software object to re-direct the web browser to the first software object for accessing the protected network resource.
2 Assignments
0 Petitions
Accused Products
Abstract
A system for authenticating a request to access a protected network resource behind two security layers is disclosed. The system includes a client which contains a web browser, a first server tier, and second server tier. The first server tier is protected behind a first security layer and hosts a first software object and second software object. The first server tier is operatively coupled to the client system via a first connection wherein the first software object and second software object are configured to be in communications with the web browser. The second server tier is protected behind the first security layer and second security layer and hosts an authentication service. The second server tier is operatively coupled to the first server tier via a second connection wherein the authentication service is configured to be in communications with the second software object.
101 Citations
20 Claims
-
1. A computer implemented method for authenticating a request to access a protected network resource, comprising:
-
receiving the request to access the protected network resource at a first software object, the request originating from a web browser; permitting access to the protected network resource by the first software object, if the request includes a required authentication token to access the protected network resource; re-directing the request to a distributed software object by the first software object, if the request does not include the required authentication token to access the protected network resource, the distributed software object being protected by a first security layer; translating the re-directed request into a client credentials requirement input call for an authentication service, by the distributed software object; communicating the client credentials requirement input call by the distributed software object across a second security layer to the authentication service using a backchannel that only allows communication through the distributed software object, the first software object being prevented from accessing the authentication service, the authentication service being protected by the second security layer, the second security layer being behind the first security layer, wherein the authentication service resides in a distinct space that is separate from the space where the first software object, the distributed software object and the protected network resource reside; requesting input from the authentication service specifying a required authentication solution by the distributed software object based on the client credentials requirement input call; receiving the input from the authentication service to the distributed software object; and arbitrating an authentication transaction sequence between the web browser and the authentication service based upon the received input, wherein arbitration between the web browser and the authentication service is only through the distributed software object without utilizing the first software object, wherein the arbitration includes, receiving a response with the required authentication solution by the distributed software object using the web browser, the response enabling issuance of a new authentication token by the authentication service to the distributed software object so as to allow the distributed software object to re-direct the web browser to the first software object for accessing the protected network resource. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer system for implementing authentication of a request to access a protected network resource behind two security layers, comprising:
an authentication server, the authentication server hosting a first software object and a second software object, the first software object and the second software object capable of being executed by a microprocessor, the first software object and the second software object being protected by a first security layer, the first software object including a web agent residing within a first web container, the web agent configured to provide access to the protected network resource if the request includes a required authentication token and to communicate with the second software object if the request does not include the required authentication token to access the protected network resource, the second software object including a distributed authentication module residing within a second web container, the distributed authentication module configured to, translate the request into a client credentials requirement input call for an authentication service; communicate the client credentials requirement input call to the authentication service using a backchannel that only allows communication through the distributed authentication module, the web agent being prevented from accessing the authentication service; request input from the authentication service specifying a required authentication solution based on the client credentials requirement input call; and arbitrate authentication transactions between a web browser requesting the protected network resource outside the two security layers and the authentication service, the authentication service being protected by a second security layer, the second security layer being behind the first security layer, wherein the authentication service resides in a distinct space that is separate from the space where the first software object, the second software object and the protected network resource reside, wherein arbitration between the authentication service and the web browser is provided only through the distributed authentication module without utilizing the web agent, wherein the arbitration includes, receiving a response with the required authentication solution by the second software object using the web browser based on relaying of the input to the web browser by the second software object, the response enabling issuance of a new authentication token by the authentication service to the second software object so as to allow the second software object to re-direct the web browser to the first software object for accessing the protected network resource. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
14. A computer system for implementing authentication of a request to access a protected network resource behind two security layers, comprising:
-
a client, the client containing a web browser; a first server tier protected behind a first security layer, the first server tier hosting a first software object and a second software object, the first software object and the second software object capable of being implemented by a microprocessor, the first server tier being operatively coupled to the client system via a first connection, wherein the first software object and the second software object are each configured to be in communications with the web browser; and a second server tier protected behind the first security layer and a second security layer, the second server tier hosting an authentication service, wherein the authentication service resides in a distinct space that is separate from the space where the first software object, the second software object and the protected network resource reside, the second server tier being operatively coupled to the first server tier via a second connection, wherein the authentication service is configured to be in communications with the second software object, wherein the first software object is configured to provide access to the protected network resource if the request includes a required authentication token and to communicate with the second software object if the request does not include the required authentication token to access the protected network resource and wherein the second software object is configured to, translate the request into a client credentials requirement input call for an authentication service; communicate the client credentials requirement input call to the authentication service using a backchannel that only allows communication through the distributed software object in the first server tier, the first software object being prevented from accessing the authentication service; request input from the authentication service specifying a required authentication solution based on the client credentials requirement input call; and arbitrate authentication transactions between a web browser requesting the protected network resource outside the two security layers and the authentication service, wherein arbitration between the web browser and the authentication service is provided only through the distributed authentication module without utilizing the first software object, wherein the arbitration includes, receiving a response with the required authentication solution by the distributed software object using the web browser, the response enabling issuance of a new authentication token by the authentication service to the distributed software object so as to allow the distributed software object to re-direct the web browser to the first software object for accessing the protected network resource. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification