Leveraging a Persistent Connection to Access a Secured Service
5 Assignments
0 Petitions
Accused Products
Abstract
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client, and brokering a connection between the client and a secured service based on a second request from the client by leveraging the persistent connection with the client. The brokering may occur before the client attempts to connect to the secured service directly and the connection may be established between the client and the secured service without provision by the client of authentication information duplicative or additional to authentication information provided by the client to establish the persistent connection.
-
Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A computer-implemented method, performed by an intermediary system, to provide a client with access to a secured service, the method comprising:
-
establishing, with at least one processor, a persistent connection with the client; receiving, from the client, a request to access the secured service; authenticating, based on the request, the client with the secured service; receiving access information from the secured service based on the authenticating; and transmitting authorization information to the client to enable the client to access the secured service independent of the persistent connection. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A method, performed by a client system, of accessing a secured service, the method comprising:
-
establishing, with at least one processor, a persistent connection with an intermediary system; sending, to the intermediary system, a request to access the secured service; authenticating, via the intermediary system, with the secured service; receiving, from the intermediary system, authorization information; and accessing the secured service independent of the persistent connection based on the authorization information. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39)
-
-
40. An intermediary system comprising:
-
at least one processor; and at least one computer readable medium coupled to the at least one processor having instructions stored thereon which, when executed by the at least one processor, causes the at least one processor to; establish a persistent connection with the client; receive, from the client, a request to access the secured service; authenticate, based on the request, the client with the secured service; receive access information from the secured service based on the authenticating; and transmit authorization information to the client to enable the client to access the secured service independent of the persistent connection.
-
Specification