LEVERAGING A PERSISTENT CONNECTION TO ACCESS A SECURED SERVICE
First Claim
1. A method, performed by an intermediary system, of leveraging a persistent connection with a client to provide the client with access to a secured service, the method comprising:
- receiving a first request from a client system at an intermediary system, the first request relating to a request for access to the intermediary system;
establishing a persistent connection between the client system and the intermediary system in response to the first request from the client system;
receiving a second request from the client system at the intermediary system, the second request relating to a request for access to a secured service that is physically distinct of the intermediary system;
authenticating the intermediary system to the secured service responsive to the second request; and
brokering a direct authenticated connection between the client system and the secured service based on the authentication of the intermediary system to the secured service, the direct authenticated connection between the client system and the secured service being independent of the persistent connection between the client system and the intermediary system.
5 Assignments
0 Petitions
Accused Products
Abstract
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client, and brokering a connection between the client and a secured service based on a second request from the client by leveraging the persistent connection with the client. The brokering may occur before the client attempts to connect to the secured service directly and the connection may be established between the client and the secured service without provision by the client of authentication information duplicative or additional to authentication information provided by the client to establish the persistent connection.
-
Citations
20 Claims
-
1. A method, performed by an intermediary system, of leveraging a persistent connection with a client to provide the client with access to a secured service, the method comprising:
-
receiving a first request from a client system at an intermediary system, the first request relating to a request for access to the intermediary system; establishing a persistent connection between the client system and the intermediary system in response to the first request from the client system; receiving a second request from the client system at the intermediary system, the second request relating to a request for access to a secured service that is physically distinct of the intermediary system; authenticating the intermediary system to the secured service responsive to the second request; and brokering a direct authenticated connection between the client system and the secured service based on the authentication of the intermediary system to the secured service, the direct authenticated connection between the client system and the secured service being independent of the persistent connection between the client system and the intermediary system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, performed by a client system, of establishing a connection with a secured service, the method comprising:
-
sending, to an intermediary system from a client system, a first request for access to the intermediary system; establishing a persistent connection with the intermediary system in response to the first request from the client system; sending, to the intermediary system from the client system, a second request for access to a secured service that is physically distinct of the intermediary system; and establishing a direct authenticated connection with the secured service based on an authentication of the intermediary system to the secured service, the direct authenticated connection with the secured service being independent of the persistent connection with the intermediary system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. An intermediary system comprising:
-
at least one computer; and at least one computer-readable medium coupled to the at least one computer having instructions stored thereon which, when executed by the at least one computer, causes the at least one computer to perform operations comprising; receiving a first request from a client system, the first request relating to a request for access to the intermediary system; establishing a persistent connection with the client system in response to the first request from the client system; receiving a second request from the client system, the second request relating to a request for access to a secured service that is physically distinct of the intermediary system; authenticating the intermediary system to the secured service responsive to the second request; and brokering a direct authenticated connection between the client system and the secured service based on the authentication of the intermediary system to the secured service, the direct authenticated connection between the client system and the secured service being independent of the persistent connection between the client system and the intermediary system. - View Dependent Claims (20)
-
Specification