Proxy authentication
First Claim
1. A method comprising:
- by an operating system of a client computing device, receiving, from an authorized user using a software application executing on the client computing device, an indication as to whether the software application is authorized to access user data stored on a remote host;
by the operating system, sending to the remote host a request to store access permissions indicating whether the software application is authorized to access the user data from the remote host based on the indication received from the authorized user;
by the operating system, upon receiving a request to access the user data, authenticating a source of the request and (1) if the source is the software application, then transmitting a request for the user data to the remote host, (2) else if the source is another software application, then denying access to the user data.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes receiving, by an operating system of the first computing device and from a client application executing on the first computing device, a first request for accessing a set of data associated with a user of the first computing device. The set of data is managed by a second computing device. The method further includes sending, by the operating system and to the second computing device, a second request for accessing the set of data. The method still further includes receiving, by the operating system and from the second computing device, a response to the second request. The method additionally includes, if the response to the second request grants the client application access to the set of data, then forwarding, by the operating system and to the client application, an access token to be used by the client application for accessing the set of data with the second computing device.
-
Citations
18 Claims
-
1. A method comprising:
-
by an operating system of a client computing device, receiving, from an authorized user using a software application executing on the client computing device, an indication as to whether the software application is authorized to access user data stored on a remote host; by the operating system, sending to the remote host a request to store access permissions indicating whether the software application is authorized to access the user data from the remote host based on the indication received from the authorized user; by the operating system, upon receiving a request to access the user data, authenticating a source of the request and (1) if the source is the software application, then transmitting a request for the user data to the remote host, (2) else if the source is another software application, then denying access to the user data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A client computing device comprising:
-
a memory comprising instructions executable by one or more processors; and the one or more processors coupled to the memory and operable to execute the instructions, the one or more processors being operable when executing the instructions to; receive, from an authorized user using a software application executing on the client computing device, an indication as to whether the software application is authorized to access user data stored on a remote host; send to the remote host a request to store access permissions indicating whether the software application is authorized to access the user data from the remote host based on the indication received from the authorized user; and upon receiving a request to access the user data, authenticate a source of the request and (1) if the source is the software application, then transmitting a request for the user data to the remote host, (2) else if the source is another software application, then denying access to the user data. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. One or more computer-readable non-transitory storage media embodying software operable when executed by a first computer system to:
-
receive, from an authorized user using a software application executing on the client computing device, an indication as to whether the software application is authorized to access user data stored on a remote host; send to the remote host a request to store access permissions indicating whether the software application is authorized to access the user data from the remote host based on the indication received from the authorized user; and upon receiving a request to access the user data, authenticate a source of the request and (1) if the source is the software application, then transmitting a request for the user data to the remote host, (2) else if the source is another software application, then denying access to the user data.
-
Specification