Leveraging a Persistent Connection to Access a Secured Service
First Claim
1. A method of leveraging a connection with a client to provide the client with access to a service, the method comprising;
- establishing an authenticated connection with the client;
receiving, from the client, a request for access to a service;
in response to receiving the request for access to the service, sending, to a computer system associated with the service, a request for temporary access information for the service based on the established authenticated connection with the client;
receiving, from the computer system associated with the service, the temporary access information for the service; and
transmitting the temporary access information to the client to enable the client to provide the temporary access information to the computer system associated the service to establish an authenticated connection between the client and the service.
7 Assignments
0 Petitions
Accused Products
Abstract
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client, and brokering a connection between the client and a secured service based on a second request from the client by leveraging the persistent connection with the client. The brokering may occur before the client attempts to connect to the secured service directly and the connection may be established between the client and the secured service without provision by the client of authentication information duplicative or additional to authentication information provided by the client to establish the persistent connection.
-
Citations
20 Claims
-
1. A method of leveraging a connection with a client to provide the client with access to a service, the method comprising;
-
establishing an authenticated connection with the client;
receiving, from the client, a request for access to a service;
in response to receiving the request for access to the service, sending, to a computer system associated with the service, a request for temporary access information for the service based on the established authenticated connection with the client;
receiving, from the computer system associated with the service, the temporary access information for the service; and
transmitting the temporary access information to the client to enable the client to provide the temporary access information to the computer system associated the service to establish an authenticated connection between the client and the service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. At least one computer readable medium storing one or more computer programs including instructions that, when executed, perform operations comprising;
-
establishing an authenticated connection with the client;
receiving, from the client, a request for access to a service;
in response to receiving the request for access to the service, sending, to a computer system associated with the service, a request for temporary access information for the service based on the established authenticated connection with the client;
receiving, from the computer system associated with the service, the temporary access information for the service; and
transmitting the temporary access information to the client to enable the client to provide the temporary access information to the computer system associated the service to establish an authenticated connection between the client and the service. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system comprising:
-
a client device;
an intermediary server; and
a service system, wherein;
the client device is configured to send, to the intermediary server, authentication information, the intermediary server is configured to;
receive, from the client device, the authentication information, and establish an authenticated connection with the client device based on the authentication information, the client device is further configured to send, to the intermediary server, a request for access to a service, the intermediary server is further configured to;
receive, from the client device, the request for access to the service, and in response to receiving the request for access to the service, send, to the service system, a request for temporary access information for the service based on the established authenticated connection with the client, the service system is configured to;
receive, from the intermediary server, the request for temporary access information for the service, and in response to receiving the request for temporary access information for the service, send, to the intermediary server, the temporary access information for the service, the intermediary server is further configured to;
receive, from the service system, the temporary access information for the service, and in response to receiving the temporary access information for the service, send, to the client device, the temporary access information for the service, the client device is further configured to;
receive, from the intermediary server, the temporary access information for the service, and in response to receiving the requested temporary access information for the service, send, to the service system, the temporary access information for the service, the service system is further configured to;
receive, from the client device, the temporary access information for the service, and establish an authenticated connection with the client device based on receiving, from the client device, the temporary access information for the service.
-
Specification