Authenticator app for consent architecture
Abstract:
A method 1000 for authenticating operations within consent architecture includes obtaining an operation request 142 requesting a service application 140 to access a remote entity 130 to perform an operation (138). The method also includes issuing, by the service application, an authentication request 152 requesting an authenticator application 150 to obtain user authentication credentials 154 for authenticating a user 12 before the remote entity performs the operation. The method also includes encrypting, by the authenticator application, the obtained user authentication credentials using a public key 132 of the remote entity. The service application is restricted from obtaining the user authentication credentials in unencrypted form. The method also includes providing, by the authenticator application, the encrypted user authentication credentials to the service application and transmitting, by the service application, the operation request and the encrypted user authentication credentials to the remote entity.
Public/Granted literature
Information query
Patent Agency Ranking
0/0