×

Systems and methods for providing single sign-on authentication services

  • US 10,382,428 B2
  • Filed: 09/21/2016
  • Issued: 08/13/2019
  • Est. Priority Date: 09/21/2016
  • Status: Active Grant
First Claim
Patent Images

1. A system for providing single sign-on services between a user device and a plurality of application servers providing application services, the system comprising:

  • a system server coupled to a plurality of application servers, the plurality of application servers providing application services to a user, the system server operating to;

    register a user device associated with a user based on receiving one or more passwords from the user device for accessing application services provided by the plurality of application servers;

    receive, from the user device, a request to access one of the plurality of application servers, the received request including data encrypted at the user device using a first corresponding key of a first key pair, the first key pair being generated by the system server based on a key threshold allowing the first key pair to be updated systematically or periodically or both, the first corresponding key associated with identifier data associated with the user device;

    analyze the received request to identify the user device and a first key of the first key pair for decrypting the encrypted data, the first key being associated with the user device, and a password stored at the system server, the password being previously provided by the user for accessing the one of the plurality of application servers;

    decrypt the encrypted data using the first key;

    generate a second key using the password;

    encrypt the decrypted data using the second key; and

    transmit, to the one of the plurality of application servers, the data encrypted using the second key for the one of the plurality of application servers to provide at least one of the application services to the user based on the transmitted data by identifying the second key and identifying a second corresponding key based on the identified second key and decrypting the transmitted data using the identified second corresponding key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×