Mobile application, resource management advice
First Claim
Patent Images
1. A mobile device, comprising:
- a memory device of storing a plurality of instructions; and
one or more computer processors configured to access the memory device and execute the plurality of instructions to at least;
execute, by at least one of the one or more computer processors of the mobile device, a security agent application for communicating with a remote authentication service provider computer;
execute, by the at least one of the one or more computer processors of the mobile device, a first local application that is different from the security application;
receive, by the security agent application of the mobile device that is implemented by the at least one of the one or more computer processors of the mobile device, a request to access a first remote service hosted external to the mobile device, the request provided to the security agent application by the first local application of the mobile device;
provide, by the security agent application of the mobile device, an authentication request to the remote authentication service provider computer;
receive, by the security agent application of the mobile device, a first access token for enabling the first local application to access the first remote service;
provide, by the security agent application of the mobile device, the first access token to the first local application; and
provide, by the security agent application of the mobile device, a second access token for enabling a second local application of the mobile device to access a second remote service hosted external to the mobile device, the second access token provided to the second local application of the mobile device.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for a resource management advice service are provided. In some examples, resource management advice and/or instructions may be provided for use with mobile devices, mobile applications, cloud applications, and/or other web-based applications. For example a mobile client may request to perform one or more resource management operations associated with a service provider. Based at least in part on the requested operation and/or the particular service provider, advice and/or instructions for managing the resource may be provided.
-
Citations
20 Claims
-
1. A mobile device, comprising:
-
a memory device of storing a plurality of instructions; and one or more computer processors configured to access the memory device and execute the plurality of instructions to at least; execute, by at least one of the one or more computer processors of the mobile device, a security agent application for communicating with a remote authentication service provider computer; execute, by the at least one of the one or more computer processors of the mobile device, a first local application that is different from the security application; receive, by the security agent application of the mobile device that is implemented by the at least one of the one or more computer processors of the mobile device, a request to access a first remote service hosted external to the mobile device, the request provided to the security agent application by the first local application of the mobile device; provide, by the security agent application of the mobile device, an authentication request to the remote authentication service provider computer; receive, by the security agent application of the mobile device, a first access token for enabling the first local application to access the first remote service; provide, by the security agent application of the mobile device, the first access token to the first local application; and provide, by the security agent application of the mobile device, a second access token for enabling a second local application of the mobile device to access a second remote service hosted external to the mobile device, the second access token provided to the second local application of the mobile device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer-readable memory storing a plurality of instructions executable by one or more computer processors of a mobile device, the plurality of instructions, when executed, cause the one or more computer processors to at least:
-
execute, by at least one of the one or more computer processors of the mobile device, a security agent application for communicating with a remote authentication service provider computer; execute, by the at least one of the one or more computer processors of the mobile device, a first local application that is different from the security application; receive, by the security agent application of the mobile device that is implemented by the at least one of the one or more computer processors of the mobile device, a request to access a first remote service hosted external to the mobile device, the request provided to the security agent application by the first local application of the mobile device; provide, by the security agent application of the mobile device, an authentication request to the remote authentication service provider computer; receive, by the security agent application of the mobile device, a first access token for enabling the first local application to access the first remote service; provide, by the security agent application of the mobile device, the first access token to the first local application; and provide, by the security agent application of the mobile device, a second access token for enabling a second local application of the mobile device to access a second remote service hosted external to the mobile device, the second access token provided to the second local application of the mobile device. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method configured to be executed by one or more computer processors of a mobile device, comprising:
-
executing, by at least one of the one or more computer processors of the mobile device, a security agent application for communicating with a remote authentication service provider computer; execute, by the at least one of the one or more computer processors of the mobile device, a first local application that is different from the security application; receiving, by the security agent application of the mobile device that is implemented by the at least one of the one or more computer processors of the mobile device, a request to access a first remote service hosted external to the mobile device, the request provided to the security agent application by the first local application of the mobile device; providing, by the security agent application of the mobile device, an authentication request to the remote authentication service provider computer; receiving, by the security agent application of the mobile device, a first access token for enabling the first local application to access the first remote service; providing, by the security agent application of the mobile device, the first access token to the first local application; and providing, by the security agent application of the mobile device, a second access token for enabling a second local application of the mobile device to access a second remote service hosted external to the mobile device, the second access token provided to the second local application of the mobile device. - View Dependent Claims (19, 20)
-
-
16. The computer-implemented method of 15, wherein the authentication request is provided to the remote authentication service provider as a representational state transfer (REST) method call.
- 17. The computer-implemented method of 15, wherein the authentication request is provided to request authentication of a user of the mobile device.
Specification