Systems and methods for authenticating an online user using a secure authorization server
First Claim
1. A secure authorization server for verifying an identity of an end user, said secure authorization server comprising at least one processor in communication with at least one memory, said secure authorization server programmed to:
- receive, from a computing client, an authentication request including a first redirection uniform resource indicator (URI);
transmit, to the end user in response to the authentication request, a login credential request;
receive, from the end user in response to the login credential request, end user login credentials;
transmit, in response to authenticating the end user login credentials, an authentication response to the computing client via the first redirection URI, wherein the authentication response includes an authorization code;
receive, from the computing client, a token request, wherein the token request includes the authorization code and a second redirection URI; and
transmit, in response to validating the authorization code and determining that the second redirection URI matches the first redirection URI, a token response to the computing client via the first redirection URI, wherein the token response includes an access token having a lifetime.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure authorization server computer system for verifying an identity of an end-user is provided. The computer system is programmed to receive, from a computing client, an authentication request at an authorization component. The authentication request includes a secure authentication request identifier. The computer system is also programmed to validate the authentication request at the authorization component by validating the secure authentication request identifier. The computer system is further programmed to transmit an authentication response from the authorization component to the computing client. The authentication response includes an authorization code. The authorization code represents a validation of the authentication request.
21 Citations
21 Claims
-
1. A secure authorization server for verifying an identity of an end user, said secure authorization server comprising at least one processor in communication with at least one memory, said secure authorization server programmed to:
-
receive, from a computing client, an authentication request including a first redirection uniform resource indicator (URI); transmit, to the end user in response to the authentication request, a login credential request; receive, from the end user in response to the login credential request, end user login credentials; transmit, in response to authenticating the end user login credentials, an authentication response to the computing client via the first redirection URI, wherein the authentication response includes an authorization code; receive, from the computing client, a token request, wherein the token request includes the authorization code and a second redirection URI; and transmit, in response to validating the authorization code and determining that the second redirection URI matches the first redirection URI, a token response to the computing client via the first redirection URI, wherein the token response includes an access token having a lifetime. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for verifying an identity of an end user, said method implemented using a secure authorization computing device including at least one processor in communication with a memory, the secure authorization computing device in communication with a computing client, said method comprising:
-
receiving, from the computing client, an authentication request including a first redirection uniform resource indicator (URI); transmitting, to the end user in response to the authentication request, a login credential request; receiving, from the end user in response to the login credential request, end user login credentials; transmitting, in response to authenticating the end user login credentials, an authentication response to the computing client via the first redirection URI, wherein the authentication response includes an authorization code; receiving, from the computing client, a token request, wherein the token request includes the authorization code and a second redirection URI; transmitting, in response to validating the authorization code and determining that the second redirection URI matches the first redirection URI, a token response to the computing client via the first redirection URI, wherein the token response includes an access token having a lifetime. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage media having computer-executable instructions embodied thereon for verifying an identity of an end user, wherein when executed by at least one processor, the computer-executable instructions cause the processor to:
-
receive, from a computing client, an authentication request including a first redirection uniform resource indicator (URI); transmit, to the end user in response to the authentication request, a login credential request; receive, from the end user in response to the login credential request, end user login credentials; transmit, in response to authenticating the end user login credentials, an authentication response to the computing client via the first redirection URI, wherein the authentication response includes an authorization code; receive, from the computing client, a token request, wherein the token request includes the authorization code and a second redirection URI; transmit, in response to validating the authorization code and determining that the second redirection URI matches the first redirection URI, a token response to the computing client via the first redirection URI, wherein the token response includes an access token having a lifetime. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification