ENABLING SECURE ACCESS TO A DISCOVERED LOCATION SERVER FOR A MOBILE DEVICE
First Claim
1. A method for obtaining a secure connection between a first server and a client, the method comprising:
- establishing a secure communication session between a second server and the client, wherein the second server is trusted by the first server, and the second server is configured to authenticate the client;
receiving, by the client, a client token using the secure communication session, wherein the client token is defined for the first server and contains data associated with the first server, the second server, the client, and a digital signature;
requesting, by the client, secure communication access to the first server, wherein the requesting includes transferring the client token to the first server; and
receiving, by the client, a grant of secure communication access to the first server based on authentication of the client by the first server, wherein the authentication is based on the client token validating the client and the digital signature validating the client token.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for obtaining a secure connection between a first server and a client. The method may comprise establishing a secure communication session between a second server and the client, wherein the second server is trusted by the first server, and the second server is configured to authenticate the client. The client may receive a client token, wherein the client token contains data associated with the first server, the second server, the client, and a digital signature. Then, the client may request secure communication access to the first server, wherein the request includes transferring the client token to the first server. Finally, the client may receive a grant of secure communication access to the first server based on authentication of the client by the first server, wherein the authentication is based on the client token validating the client and the digital signature validating the client token.
-
Citations
42 Claims
-
1. A method for obtaining a secure connection between a first server and a client, the method comprising:
-
establishing a secure communication session between a second server and the client, wherein the second server is trusted by the first server, and the second server is configured to authenticate the client; receiving, by the client, a client token using the secure communication session, wherein the client token is defined for the first server and contains data associated with the first server, the second server, the client, and a digital signature; requesting, by the client, secure communication access to the first server, wherein the requesting includes transferring the client token to the first server; and receiving, by the client, a grant of secure communication access to the first server based on authentication of the client by the first server, wherein the authentication is based on the client token validating the client and the digital signature validating the client token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A client for obtaining a secure connection with a first server, the client comprising:
-
one or more processors; and memory storing computer-readable instructions that, when executed by the one or more processors, cause the client to; establish a secure communication session between a second server and the client, wherein the second server is trusted by the first server, and the second server is configured to authenticate the client; receive a client token using the secure communication session, wherein the client token is defined for the first server and contains data associated with the first server, the second server, the client, and a digital signature; request secure communication access to the first server, wherein the request includes transferring the client token to the first server; and receive a grant of secure communication access to the first server based on authentication of the client by the first server, wherein the authentication is based on the client token validating the client and the digital signature validating the client token. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. One or more computer-readable media storing computer-executable instructions for obtaining a secure connection between a first server and a client that, when executed, cause one or more computing devices included in the client to:
-
establish a secure communication session between a second server and the client, wherein the second server is trusted by the first server, and the second server is configured to authenticate the client; receive a client token using the secure communication session, wherein the client token is defined for the first server and contains data associated with the first server, the second server, the client, and a digital signature; request secure communication access to the first server, wherein the request includes transferring the client token to the first server; and receive a grant of secure communication access to the first server based on authentication of the client by the first server, wherein the authentication is based on the client token validating the client and using the digital signature validating the client token.
-
-
31. A apparatus for obtaining a secure connection between a first server and a client, the apparatus comprising:
-
means for establishing a secure communication session between a second server and the client, wherein the second server is trusted by the first server, and the second server is configured to authenticate the client; means for receiving, by the client, a client token using the secure communication session, wherein the client token is defined for the first server and contains data associated with the first server, the second server, the client, and a digital signature; means for requesting, by the client, secure communication access to the first server, wherein the requesting includes transferring the client token to the first server; means for receiving, by the client, a grant of secure communication access to the first server based on authentication of the client by the first server, wherein the authentication is based on the client token validating the client and the digital signature validating the client token. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification