Patent number 8763151 is assigned to
The following quote was obtained by the news editors from the background information supplied by the inventors: "When a user stores data in a first server, and has a second server use the data stored in the first server, a protocol so called 'OAuth' begins to be used. OAuth will be explained using FIG. 1, simply.
"As an assumption in FIG. 1, a user stores its own data in a provider. In addition, a consumer registers itself in the provider in advance. Then, the user instructs the consumer to obtain an access right to its own data stored in the provider (step (1)). As a result, the consumer accesses the provider (step (2)), and obtains an unauthorized request token R0 from the provider (step (3)). After that, the consumer has the user redirect to the provider (step (4)). At this time, the consumer attaches the unauthorized request token R0 to Uniform Resource Locator (URL) parameters to send the unauthorized request token R0 to the provider through the user. In response to an access from the user, the provider transmits data to request the user to authorize acquisition of the access right to the provider by the consumer, to the user (step (5)). In response to receipt of the data, the user transmits notification representing the acquisition of the access right by the consumer is allowed to the provider (step (6)). Then, the provider changes the unauthorized request token R0 to the authorized request token R1, and has the user redirect to the consumer (step (7)). At this time, the provider attaches the authorized request token R1 to the URL parameters to send the authorized request token R1 to the consumer through the user.
"After that, the consumer transmits the authorized request token R1 to the provider (step (8)), and obtains an access token A from the provider (step (9)). Then, the consumer obtains the data of the user from the provider by using this access token A (step (10)).
"Generally, not only plural consumers but also plural providers exist, and the aforementioned processing is carried out for each combination. In addition, because the valid term is set for the access right, the same processing is carried out when the valid term is expired. This is complex for the user.
"A conventional technique exists in which an intermediate authentication server is introduced in an authentication mechanism so called 'OpenID' to secure the confirmation of the identity. However, this technique cannot resolve the aforementioned problem. Moreover, there is a proxy authentication. For example, a proxy authentication apparatus accesses a server that is connected through a network in response to a request from a client. In this proxy authentication apparatus, plural authentication confirmation logics exist to identify a response representing that the user authentication is incomplete. Then, the proxy authentication apparatus determines based on whether or not the response from the server matches either of the plural authentication confirmation logics, whether the user authentication is required or not. When it is determined that the user authentication is required, the proxy authentication apparatus carries out the user authentication procedure with the server according to the authentication procedure defined in advance in association with the authentication confirmation logic that matches the response from the server. This technique does not assume the situation like in the aforementioned OAuth, and cannot be applied, simply."
In addition to the background information obtained for this patent, VerticalNews journalists also obtained the inventor's summary information for this patent: "This mediation processing method is executed by a mediation apparatus respectively communicating with a first apparatus holding data of a user, a second apparatus obtaining and using data of the user from the first apparatus and a terminal of the user. Then, this method includes: (A) obtaining an identifier of the user and an identifier of the second apparatus from the terminal of the user, and storing obtained data into a data storage unit; (B) upon receipt of a first response including the identifier of the first apparatus and first data that the first apparatus issues and that represents that use of the data of the user by the second apparatus is unauthorized, from the second apparatus after accessing the second apparatus, confirming whether or not a combination of the identifier of the user, the identifier of the second apparatus, which are stored in the data storage unit, and an identifier of the first apparatus is stored in an automatic response data storage unit storing data for an automatic response for the first apparatus; (C) upon detecting that the combination is not stored in the automatic response data storage unit, transmitting the first response to the terminal of the user; causing the terminal of the user to perform a transaction for an authorization for the use of the data of the user by the second apparatus with the first apparatus through the mediation apparatus to store data of the transaction into the data storage unit; and (D) upon receipt of a response including second data representing that the use of the data of the user by the second apparatus is authorized from the first apparatus, storing matching data and reply data, which are generated from the data of the transaction, which is stored in the data storage unit, into the automatic response data storage unit as correlated with the identifier of the user, the identifier of the second apparatus and the identifier of the first apparatus.
"The object and advantages of the embodiment will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
"It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the embodiment, as claimed."
URL and more information on this patent, see: Kurumai, Noboru. Mediation Processing Method, Mediation Apparatus and System. U.S. Patent Number 8763151, filed
Keywords for this news article include:
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC
Most Popular Stories
- U.S. Families 'Extraordinarily Vulnerable': Yellen
- Larry Ellison Steps Down as Oracle CEO
- Hillary Clinton to Address CHCI Conference
- Alibaba Prices IPO at $68 a Share
- Apple Locks Itself Out of Devices
- Veterans to Get Training as Solar Panel Installers
- Hispanics Doubt Marco Rubio's Chances
- Wildfires Rage in California
- John Cantlie Delivers ISIS Message to Save Life
- Alibaba: Today China, Tomorrow the World