Web ticket based upon a symmetric key usable for user authentication
First Claim
Patent Images
1. A computing system comprising:
- at least one processor; and
memory storing instructions that, when executed by the at least one processor, cause the at least one processor to perform acts comprising;
generating a first symmetric key and storing the first symmetric key in computer-readable storage, the first symmetric key has a first expiration time assigned thereto;
responsive to receiving a request for a first web ticket from a first computing device that is in communication with the computing system, generating the first web ticket based upon the first symmetric key wherein the first web ticket has a second expiration time assigned thereto that is subsequent the first expiration time;
responsive to receiving the request for the first web ticket, transmitting the first web ticket to the first computing device, wherein the first web ticket is valid for authenticating the first computing device until the second expiration time has passed, and further wherein the first computing device is authenticated subsequent to the first expiration time based upon the first web ticket and the first symmetric key;
generating a second symmetric key and storing the second symmetric key in the computer-readable storage, the second symmetric key has a third expiration time assigned thereto, the third expiration time is subsequent to the first expiration time and prior to the second expiration time;
subsequent to the first expiration time, prior to the second expiration time, and responsive to receiving a second request for a second web ticket from a second computing device that is in communication with the computing system, generating the second web ticket based upon the second symmetric key, wherein the second web ticket has a fourth expiration time assigned thereto that is subsequent the second expiration time; and
responsive to receiving the request for the second web ticket, transmitting the second web ticket to the second computing device, wherein the second web ticket is valid for authenticating the second computing device until the fourth expiration time has passed, and further wherein the second computing device is authenticated based upon the second web ticket and the second symmetric key.
2 Assignments
0 Petitions
Accused Products
Abstract
Described herein are various aspects pertaining to generating web tickets for use with authenticating computing devices to a computing system. Symmetric keys are used when generating the web tickets, wherein a symmetric key is valid for use when generating web tickets for a first period of time, and a web ticket generated based upon the symmetric key is valid for use when authenticating a computing device for a second period of time that is longer than the first period of time. Thus, the symmetric key is used for authenticating computing devices after it has ceased being used to generate web tickets.
62 Citations
20 Claims
-
1. A computing system comprising:
-
at least one processor; and memory storing instructions that, when executed by the at least one processor, cause the at least one processor to perform acts comprising; generating a first symmetric key and storing the first symmetric key in computer-readable storage, the first symmetric key has a first expiration time assigned thereto; responsive to receiving a request for a first web ticket from a first computing device that is in communication with the computing system, generating the first web ticket based upon the first symmetric key wherein the first web ticket has a second expiration time assigned thereto that is subsequent the first expiration time; responsive to receiving the request for the first web ticket, transmitting the first web ticket to the first computing device, wherein the first web ticket is valid for authenticating the first computing device until the second expiration time has passed, and further wherein the first computing device is authenticated subsequent to the first expiration time based upon the first web ticket and the first symmetric key; generating a second symmetric key and storing the second symmetric key in the computer-readable storage, the second symmetric key has a third expiration time assigned thereto, the third expiration time is subsequent to the first expiration time and prior to the second expiration time; subsequent to the first expiration time, prior to the second expiration time, and responsive to receiving a second request for a second web ticket from a second computing device that is in communication with the computing system, generating the second web ticket based upon the second symmetric key, wherein the second web ticket has a fourth expiration time assigned thereto that is subsequent the second expiration time; and responsive to receiving the request for the second web ticket, transmitting the second web ticket to the second computing device, wherein the second web ticket is valid for authenticating the second computing device until the fourth expiration time has passed, and further wherein the second computing device is authenticated based upon the second web ticket and the second symmetric key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method executed by a computing system, the method comprising:
-
generating and storing a first symmetric key in computer-readable storage; assigning a first expiration time to the first symmetric key; receiving, from a first computing device, a first request for a first web ticket, wherein the first computing device is to authenticate with the computing system based upon the first web ticket; responsive to receiving the first request, generating the first web ticket based upon the first symmetric key, wherein the computing system is configured to use the first symmetric key to generate web tickets only until the first expiration time, the first web ticket is valid for authenticating the first computing device only until a second expiration time, and further wherein the second expiration time is subsequent the first expiration time; transmitting the first web ticket to the first computing device, wherein subsequent to the first expiration time the computing system authenticates the first computing device based upon the first web ticket when the first computing device provides the computing system with the first web ticket; generating and storing a second symmetric key in the computer-readable storage; assigning a third expiration time to the second symmetric key, wherein the third expiration time is subsequent the first expiration time; subsequent the first expiration time, receiving, from a second computing device, a second request for a second web ticket, wherein the second computing device is to authenticate with the computing system based upon the second web ticket; responsive to receiving the second request, generating the second web ticket based upon a second symmetric key, wherein the computing system is configured to use the second symmetric key to generate web tickets only until the third expiration time, the second web ticket is valid for authenticating the second computing device only until a fourth expiration time, and further wherein the fourth expiration time is subsequent the second expiration time; and transmitting the second web ticket to the second computing device, wherein the computing system authenticates the second computing device based upon the second web ticket when the second computing device provides the computing system with the second web ticket. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-readable storage medium comprising instructions that, when executed by a processor, cause the processor to perform acts comprising:
-
generating a first symmetric key and storing the first symmetric key in computer-readable storage, the first symmetric key has a first expiration time assigned thereto; responsive to receiving a request for a first web ticket from a first computing device that is in communication with the computing system, generating the first web ticket based upon the first symmetric key, wherein the first web ticket has a second expiration time assigned thereto that is subsequent the first expiration time; responsive to receiving the request for the first web ticket, transmitting the first web ticket to the first computing device, wherein the first web ticket is valid for authenticating the first computing device until the second expiration time has passed, and further wherein the first computing device is authenticated based upon the first web ticket and the first symmetric key; generating a second symmetric key and storing the second symmetric key in the computer-readable storage, the second symmetric key has a third expiration time assigned thereto, the third expiration time is subsequent to the first expiration time and prior to the second expiration time; subsequent to the first expiration time, prior to the second expiration time, and responsive to receiving a second request for a second web ticket from a second computing device that is in communication with the computing system, generating the second web ticket based upon the second symmetric key, wherein the second web ticket has a fourth expiration time assigned thereto that is subsequent the second expiration time; and responsive to receiving the request for the second web ticket, transmitting the second web ticket to the second computing device, wherein the second web ticket is valid for authenticating the second computing device until the fourth expiration time has passed, and further wherein the second computing device is authenticated based upon the second web ticket and the second symmetric key. - View Dependent Claims (20)
-
Specification