SHARING USER ID BETWEEN OPERATING SYSTEM AND APPLICATION
First Claim
1. A computer-based method for authenticating a user of an application using an operating system, comprising:
- authenticating the user with the operating system using a cloud-based identity for the user;
providing an authentication token for the user'"'"'s cloud-based identity to the application upon request to the operating system, using a computer-based processor; and
using the authentication token to authenticate the user for the application.
2 Assignments
0 Petitions
Accused Products
Abstract
One or more techniques and/or systems are disclosed for authenticating a user of an application using an operating system. A user can log onto their device, such as at power-up, using a cloud-based ID registered to an online identity service. The user can be authenticated with the operating system on the user'"'"'s device, using the cloud-based identity for the user, where the operating system may contact the online identity service to authenticate the user. When the user activates an application on the device it may request authentication of the user from the operating system, and an authentication token for the user'"'"'s cloud-based identity is provided to the application. The application then uses the authentication token to authenticate the user for the application, as long as the application supports the use of the cloud-based ID of the user. In this manner, a subsequent manual user log-in operation is not required.
155 Citations
20 Claims
-
1. A computer-based method for authenticating a user of an application using an operating system, comprising:
-
authenticating the user with the operating system using a cloud-based identity for the user; providing an authentication token for the user'"'"'s cloud-based identity to the application upon request to the operating system, using a computer-based processor; and using the authentication token to authenticate the user for the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for authenticating a user of an application using an operating system, comprising:
-
a computer-based processor configured to process data for the system; a user authentication component, operably coupled with the processor, configured to authenticate the user with the operating system using a cloud-based identity associated with the user; and an authentication token providing component, operably coupled with the user authentication component and operating system, configured to provide an authentication token based on the user'"'"'s cloud-based identity to the application for authenticating the user for the application, upon request to the operating system. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computer readable medium comprising computer executable instructions that when executed via a processor on a computer perform a method, comprising:
-
authenticating the user with the operating system using a cloud-based identity for the user, comprising; communicating with a cloud-based identity service to authenticate the user for the cloud-based identity; and retrieving user-related information from the cloud-based identity service upon authentication of the user; generating an authentication token upon authentication of the user; if the user is authenticated; upon request from the application to the operating system for access to the user'"'"'s cloud-based identity, requesting access to the user'"'"'s cloud-based identity from the user; and providing the authentication token and user-related information for the user'"'"'s cloud-based identity to the application if the application supports the user'"'"'s cloud-based identity and if the user authorizes access to the user'"'"'s cloud-based identity; and using the authentication token and user-related information to authenticate the user for the application.
-
Specification