×

Authentication context transfer for accessing computing resources via single sign-on with single use access tokens

  • US 10,382,426 B2
  • Filed: 07/02/2015
  • Issued: 08/13/2019
  • Est. Priority Date: 07/02/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for accessing computing resources using secure single sign-on authentication, the method comprising:

  • authenticating, by any of one or more computer processors, data representing a security credential of a user;

    generating, by any of the one or more computer processors, a single use access token in response to authentication of the security credential of the user, the single use access token being configured to expire for purposes of validation after a single such validation of the security credential of the user occurs against the single use access token by any application utilizing the single use access token, the single use access token including data representing the security credential of the user, wherein to expire includes marking done the single use access token;

    generating, by any of the one or more computer processors, executable code that includes the single use access token therein, wherein the executable code functions to transfer the single use access token; and

    digitally signing, by any of the one or more computer processors, the executable code with a digital signature;

    wherein, the executable code comprises instructions that, when provided onto and executed by a computing device of the user cause the computing device to check the validity of the digital signature included with the executable code and, in response to validating the digital signature included with the executable code, install at least one application that utilizes the single use access token and the single use access token onto a computer-readable medium of the computing device of the user,further cause the at least one application to validate the single use access token transferred to the computing device by the executable code with a single use token service, andfurther cause the at least one application to use the validated single use access token as the security credential of the user to access a protected computing resource without requiring entry of the security credential of the user.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×