Secure access to cloud-based services
First Claim
Patent Images
1. A method to provide secure mobile access to a cloud-based service, comprising:
- receiving, at a security proxy, credential information from the cloud-based service, wherein the credential information is extracted, by the cloud-based service, from a synthesized basic authentication header, wherein the synthesized basic authentication header includes a hash of information obtained from a security certificate that was provided from a mobile device to the security proxy, wherein the synthesized basic authentication header is provided from the security proxy to the cloud-based service;
using the extracted credential information to determine that access to the cloud-based service is authorized for the mobile device; and
providing to the cloud based service a security token that indicates the mobile device is authorized to access the cloud-based service.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques to provide secure mobile access to a cloud-based service are disclosed. In various embodiments, a request to access the cloud-based service is received from a mobile device. A security certificate associated with the request is used to synthesize a basic authentication header associated with the request. The synthesized basic authentication header is sent to the cloud-based service on behalf of the mobile device.
-
Citations
20 Claims
-
1. A method to provide secure mobile access to a cloud-based service, comprising:
-
receiving, at a security proxy, credential information from the cloud-based service, wherein the credential information is extracted, by the cloud-based service, from a synthesized basic authentication header, wherein the synthesized basic authentication header includes a hash of information obtained from a security certificate that was provided from a mobile device to the security proxy, wherein the synthesized basic authentication header is provided from the security proxy to the cloud-based service; using the extracted credential information to determine that access to the cloud-based service is authorized for the mobile device; and providing to the cloud based service a security token that indicates the mobile device is authorized to access the cloud-based service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system to provide secure mobile access to a cloud-based service, comprising:
-
a communication interface; and a processor coupled to the communication interface and configured to; receive credential information from the cloud-based service, wherein the credential information is extracted, by the cloud-based service, from a synthesized basic authentication header, wherein the synthesized basic authentication header includes a hash of information obtained from a security certificate that was provided from a mobile device to the security proxy, wherein the synthesized basic authentication header is provided from the security proxy to the cloud-based service; use the extracted credential information to determine that access to the cloud-based service is authorized for the mobile device; and provide to the cloud based service a security token that indicates the mobile device is authorized to access the cloud-based service. - View Dependent Claims (19)
-
-
20. A computer program product to provide secure mobile access to a cloud-based service, the computer program product being embodied in a non-transitory computer readable medium and comprising computer instructions for:
-
receiving credential information from the cloud-based service, wherein the credential information is extracted, by the cloud-based service, from a synthesized basic authentication header, wherein the synthesized basic authentication header includes a hash of information obtained from a security certificate that was provided from a mobile device to a security proxy, wherein the synthesized basic authentication header is provided from the security proxy to the cloud-based service; using the extracted credential information to determine that access to the cloud-based service is authorized for the mobile device; and providing to the cloud based service a security token that indicates the mobile device is authorized to access the cloud-based service.
-
Specification