Background authentication refresh
First Claim
Patent Images
1. A method comprising:
- granting access, with one or more computing devices, to a secure computing environment in response to receiving authentication information from a requesting computing device, wherein access is granted for a session having an associated period of validity and wherein one or more client applications allow secure delegated access to server resources on behalf of a resource owner by utilizing an access token provided by a remote authorization server, wherein the delegated access based on the access token has an associated period of validity that is shorter than the period of validity for the session;
refreshing the access token, with the one or more computing devices via a browser application extension, without explicit user interaction utilizing the authentication information for the session during the period of validity for the session while the session is valid by sending at least a portion of the authentication information for the session to the remote authorization server to cause the access token for the delegated access to be refreshed;
granting access, with the one or more computing devices, to the secure computing environment in response to the refreshed access token.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for refreshing an authentication token. Access is granted to a secure computing environment in response to receiving authentication information from a requesting computing device. The access is granted for a session and one or more client applications allow secure delegated access to server resources on behalf of a resource owner by utilizing an access token. The access token is refreshed without explicit user interaction utilizing the authentication information for the session while the session is valid. Access is granted to the secure computing environment in response to the refreshed access token.
-
Citations
21 Claims
-
1. A method comprising:
-
granting access, with one or more computing devices, to a secure computing environment in response to receiving authentication information from a requesting computing device, wherein access is granted for a session having an associated period of validity and wherein one or more client applications allow secure delegated access to server resources on behalf of a resource owner by utilizing an access token provided by a remote authorization server, wherein the delegated access based on the access token has an associated period of validity that is shorter than the period of validity for the session; refreshing the access token, with the one or more computing devices via a browser application extension, without explicit user interaction utilizing the authentication information for the session during the period of validity for the session while the session is valid by sending at least a portion of the authentication information for the session to the remote authorization server to cause the access token for the delegated access to be refreshed; granting access, with the one or more computing devices, to the secure computing environment in response to the refreshed access token. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable storage medium having stored thereon instructions that, when executed by one or more processors, cause the one or more processors to:
-
grant access, with one or more computing devices, to a secure computing environment in response to receiving authentication information from a requesting computing device, wherein access is granted for a session having an associated period of validity and wherein one or more client applications allow secure delegated access to server resources on behalf of a resource owner by utilizing an access token provided by a remote authorization server, wherein the delegated access based on the access token has an associated period of validity that is shorter than the period of validity for the session; refresh the access token, with the one or more computing devices via a browser application extension, without explicit user interaction utilizing the authentication information for the session during the period of validity for the session while the session is valid by sending at least a portion of the authentication information for the session to the remote authorization server to cause the access token for the delegated access to be refreshed; grant access, with the one or more computing devices, to the secure computing environment in response to the refreshed access token. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
a memory device; one or more processors coupled with the memory device, the one or more processors to grant access, with one or more computing devices, to a secure computing environment in response to receiving authentication information from a requesting computing device, wherein access is granted for a session having an associated period of validity and wherein one or more client applications allow secure delegated access to server resources on behalf of a resource owner by utilizing an access token provided by a remote authorization server, wherein the delegated access based on the access token has an associated period of validity that is shorter than the period of validity for the session, to refresh the access token, with the one or more computing devices via a browser application extension, without explicit user interaction utilizing the authentication information for the session during the period of validity for the session while the session is valid by sending at least a portion of the authentication information for the session to the remote authorization server to cause the access token for the delegated access to be refreshed, and to grant access, with the one or more computing devices, to the secure computing environment in response to the refreshed access token. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification