MOBILE APPLICATION, SINGLE SIGN-ON MANAGEMENT
First Claim
Patent Images
1. A system, comprising:
- a memory storing a plurality of instructions; and
one or more processors configured to access the memory, wherein the one or more processors are further configured to execute the plurality of instructions to;
receive, from a first application, an authentication request associated with a second application; and
provide, to the first application, an access token for allowing the second application to access a service provider accessible to the first application or the second application.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques for managing single sign-on are provided. in some examples, single sign-on functionality may be provided for use on mobile devices by utilizing mobile applications, cloud applications, and/or other web-based applications. For example, a mobile application or mobile web browser may request to authenticate with or access one or more service providers. Authentication credentials may be requested from a user of the mobile device to facilitate such authentication and/or access. Based at least in part on a successful log-in, access to server resources from other applications on the same mobile device may be provided without successive or repetitive credential requests to the user.
-
Citations
20 Claims
-
1. A system, comprising:
-
a memory storing a plurality of instructions; and one or more processors configured to access the memory, wherein the one or more processors are further configured to execute the plurality of instructions to; receive, from a first application, an authentication request associated with a second application; and provide, to the first application, an access token for allowing the second application to access a service provider accessible to the first application or the second application. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-readable memory storing a plurality of instructions executable by one or more processors, the plurality of instructions comprising:
-
instructions that cause the one or more processors to receive, from a first application, a request to access a service provider; instructions that cause the one or more processors to log in a user associated with the first application; instructions that cause the one or more processors to provide, to the first application, a token for accessing the service provider; and instructions that cause the one or more processors to provide a second token to a second application associated with the user. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented method, comprising:
-
receiving, by a computer system, a request to access a first remote application, the request received from a first local application of a mobile device; providing, by the computer system, an authentication request o a remote authentication service provider computer; receiving, by the computer system, a first access token for accessing the first remote application; providing, by the computer system, the first access token to the first local application; and providing, by the computer system, a second access token for accessing a second remote application, the second access token provided to a second local application of the mobile device. - View Dependent Claims (19, 20)
-
-
16. The computer-implemented method of 15, wherein the authentication request is provided to the remote authentication service provider as a representational state transfer (REST) method call.
- 17. The computer-implemented method of 15, wherein the authentication request is provided to request authentication of a user of the mobile device.
Specification