Secured inter-application communication in mobile devices
First Claim
1. A computer-implemented method for accessing network resources using single sign-in information, comprising:
- receiving, by a first application in a mobile computing device, sign-in information from a user; and
enabling the user to sign in to a second application, in the mobile computing device, with the first application to allow the second application to access network resources on behalf of the user from the resource server based on (a) a first application identification (ID) of the second application, the first application ID being associated with an application distribution server storing the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an access token from the resource server to allow the second application to access the network resources, the second application being configured to generate an encryption key pair including a public key and a private key, the public key being communicated to the first application with a second application identification (ID) assigned to the second application by the resource server during registration of the second application with the resource server, the mobile computing device coupled with the resource server and distribution server via a network.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure describes a method for accessing network resources which includes receiving by a first application in a mobile computing device sign-in information from a user and enabling the user to sign in to a second application with the first application to access network resources from a resource server based on (a) a first application identification (ID) of the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an authorization grant from the resource server to enable the second application to access the network resources, the mobile computing device coupled with the resource server via a network.
-
Citations
19 Claims
-
1. A computer-implemented method for accessing network resources using single sign-in information, comprising:
-
receiving, by a first application in a mobile computing device, sign-in information from a user; and enabling the user to sign in to a second application, in the mobile computing device, with the first application to allow the second application to access network resources on behalf of the user from the resource server based on (a) a first application identification (ID) of the second application, the first application ID being associated with an application distribution server storing the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an access token from the resource server to allow the second application to access the network resources, the second application being configured to generate an encryption key pair including a public key and a private key, the public key being communicated to the first application with a second application identification (ID) assigned to the second application by the resource server during registration of the second application with the resource server, the mobile computing device coupled with the resource server and distribution server via a network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product, comprising a non-transitory computer usable medium having a computer readable program code embodied therein, the computer readable program code adapted to be executed to implement a method comprising:
-
receiving, by a first application in a mobile computing device, sign-in information from a user; and enabling the user to sign in to a second application, in the mobile computing device, with the first application to allow the second application to access network resources on behalf of the user from the resource server based on (a) a first application identification (ID) of the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an access token from the resource server to allow the second application to access the network resources, the second application being configured to generate an encryption key pair including a public key and a private key, the public key being communicated to the first application with a second application identification (ID) assigned to the second application by the resource server during registration of the second application with the resource server, the mobile computing device coupled with the resource server and distribution server via a network. - View Dependent Claims (9, 10, 11, 12)
-
-
13. An apparatus comprising:
-
one or more processors; and a non-transitory computer readable medium storing a plurality of instructions, which when executed, cause the one or more processors to; receive, by a first application in a mobile computing device, sign-in information from a user; and enable the user to sign in to a second application, in the mobile computing device, with the first application to allow the second application to access network resources on behalf of the user from the resource server based on (a) a first application identification (ID) of the second application, the first application ID being associated with an application distribution server storing the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an access token from the resource server to allow the second application to access the network resources, the second application being configured to generate an encryption key pair including a public key and a private key, the public key being communicated to the first application with a second application identification (ID) assigned to the second application by the resource server during registration of the second application with the resource server, the mobile computing device coupled with the resource server and distribution server via a network. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification