Communicating information between applications executing on a client device via authentication information generated by an application
First Claim
1. A method comprising:
- receiving, at an online system including a processor, a request for authentication information to access the online system from an application executing on a client device, the request identifying an additional application executing on the client device and a user of the application via a user identifier associated with the user by the application, the additional application different from the application;
generating the authentication information in response to the received request;
storing an association between the authentication information and the user identifier associated with the user by the application at the online system;
communicating the authentication information from the online system to the application executing on the client device;
receiving, at the online system, a request to verify the authentication information from the additional application executing on the client device, the request to verify the authentication information including an additional identifier associated with the user by the additional application; and
storing an association between the additional identifier associated with the user by the additional application and the user identifier associated with the user by the application at the online system in response to the online system verifying the authentication information from the additional application.
6 Assignments
0 Petitions
Accused Products
Abstract
An application associated with an online system executing on a client device identifies an additional application on the client device with which the application may exchange information. To exchange information between the application and additional application, the online system receives a request for authentication information from the application that identifies the additional application and a user of the application. The online system generates and stores authentication information in association with an identifier associated with the user by the application and with an identifier of the additional application. After communicating the authentication information to the client device, the online system receives a request to verify the authentication information from the additional application. If the authentication information is verified, the online system stores an association between an identifier associated with the user by the additional application that was included in the request and the identifier associated with the user by the application.
16 Citations
17 Claims
-
1. A method comprising:
-
receiving, at an online system including a processor, a request for authentication information to access the online system from an application executing on a client device, the request identifying an additional application executing on the client device and a user of the application via a user identifier associated with the user by the application, the additional application different from the application; generating the authentication information in response to the received request; storing an association between the authentication information and the user identifier associated with the user by the application at the online system; communicating the authentication information from the online system to the application executing on the client device; receiving, at the online system, a request to verify the authentication information from the additional application executing on the client device, the request to verify the authentication information including an additional identifier associated with the user by the additional application; and storing an association between the additional identifier associated with the user by the additional application and the user identifier associated with the user by the application at the online system in response to the online system verifying the authentication information from the additional application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product comprising a non-transitory computer readable storage medium having instructions encoded therein on that, when executed by a processor included in a client device, cause the processor to:
-
identify an additional application executing on the client device, the additional application associated with an application executing on the client device associated with a user, the additional application different from the application; determine the identified application is installed on the client device; receive a request for the application and the additional application to exchange information, the request identifying the additional application and a user identifier associated with the user by the application; responsive to receiving the request for the application and the additional application to exchange information, communicate a request for authentication information to access an online system associated with the application to the online system associated with the application, the request for authentication information identifying the additional application and identifying the user of the application via the user identifier associated with the user by the application; receive the authentication information generated by the online system from the online system associated with the application after the online system stores an association between the authentication information and the user identified associated with the user by the application; launch the additional application and communicate the authentication information to the additional application; and communicate a request to verify the authentication information from the additional application to the online system associated with the application, the request to verify the authentication information including an additional identifier associated with the user by the additional application, wherein the online system stores an association between the additional identifier associated with the user by the additional application and the user identifier associated with the user by the application at the online system in response to the online system verifying the authentication information from the additional application. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification