×

Single sign-on to web applications from mobile devices

  • US 10,057,240 B2
  • Filed: 08/25/2014
  • Issued: 08/21/2018
  • Est. Priority Date: 08/25/2014
  • Status: Active Grant
First Claim
Patent Images

1. A mobile device comprising:

  • a hardware processor;

    a data store; and

    a single sign-on authenticator application initiated in response to a user selection of an application on the mobile device after authentication of a single Personal Identification Number (PIN) associated with a user profile, the single sign-on authenticator application configured to receive a single entry of the single PIN to provide future access to one or more applications and executed by the hardware processor, causing the hardware processor to;

    obtain and store a first secret in the data store, wherein the first secret matches a second secret stored on a database of one or more servers, wherein the second secret or an initial secret from which the second secret is generated by the one or more servers prior to the obtaining of the first secret, and wherein the first secret and the second secret are unique to the mobile device;

    responsive to a request for access to the one or more servers by another application on the mobile device, retrieve the first secret from the data store and generate, using a predetermined algorithm, a unique key based upon a multiplicative combination of the first secret and a session ID number associated with the request for access, wherein the first secret is unique from the session ID number; and

    regenerating the unique key responsive to subsequent requests for access to the one or more servers by another application on the mobile device;

    wherein the mobile device is registered with the one or more servers during a registration process at the one or more servers,wherein the hardware processor embeds the unique key in a Uniform Resource Locator (URL) communicated to the one or more servers, thereby transmitting the request for access to the one or more servers, andwherein the hardware processor generates a second initial secret and matches the initial secret with the second secret such that the second secret is generated as a combination of the initial secret and the second initial secret.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×