ENCRYPTION-BASED SESSION ESTABLISHMENT
First Claim
1. A method comprising:
- receiving, by a first server, a first token from a user device,the first token including information to authenticate the user device to communicate with the first server via a session with the first server;
determining, by the first server, whether the first token is valid;
sending, by the first server, an instruction to the user device, based on determining that the first token is invalid,the instruction requesting the user device to provide a set of credentials to a second server;
receiving, by the first server, a first response from the user device,the first response being provided to the user device by the second server, based on the user device providing the set of credentials to the second server,the first response including information identifying whether the user device is authenticated to communicate with the first server, via a session with the first server;
sending, by the first server, the first response to a third server,the third server generating a second response based on the first response,the second response indicating authentication of the user device to communicate with the first server, via a session with the first server;
receiving, by the first server, the second response from the third server;
generating, by the first server, a second token, based on receiving the second response,the second token including information to authenticate the user device to communicate with the first server via a session with the first server; and
sending, by the first server, the second token to the user device.
1 Assignment
0 Petitions
Accused Products
Abstract
A first server is configured to receive a first token from a user device, determine whether the first token is valid, request the user device to provide a set of credentials to a second server, based on determining that the first token is invalid, and receive a first response from the user device. The first response may include information identifying whether the user device is authenticated to communicate with the first server. The first server is further configured to send the first response to a third server. The third server may generate a second response to indicate authentication of the user device to communicate with the first server. The first server is further configured to receive the second response from the third server, generate a second token, based on receiving the second response, and send the second token to the user device.
65 Citations
23 Claims
-
1. A method comprising:
-
receiving, by a first server, a first token from a user device, the first token including information to authenticate the user device to communicate with the first server via a session with the first server; determining, by the first server, whether the first token is valid; sending, by the first server, an instruction to the user device, based on determining that the first token is invalid, the instruction requesting the user device to provide a set of credentials to a second server; receiving, by the first server, a first response from the user device, the first response being provided to the user device by the second server, based on the user device providing the set of credentials to the second server, the first response including information identifying whether the user device is authenticated to communicate with the first server, via a session with the first server; sending, by the first server, the first response to a third server, the third server generating a second response based on the first response, the second response indicating authentication of the user device to communicate with the first server, via a session with the first server; receiving, by the first server, the second response from the third server; generating, by the first server, a second token, based on receiving the second response, the second token including information to authenticate the user device to communicate with the first server via a session with the first server; and sending, by the first server, the second token to the user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
a first server to; receive a first token from a user device, the first token including information to authenticate the user device to communicate with the first server via a session with the first server; determine whether the first token is valid; send an instruction to the user device, based on determining that the first token is invalid, the instruction requesting the user device to provide a set of credentials to a second server; receive a first response from the user device, the first response being provided to the user device by the second server, based on the user device providing the set of credentials to the second server, the first response including information identifying whether the user device is authenticated to communicate with the first server, via a session with the first server; send the first response to a third server, the third server generating a second response based on the first response, the second response indicating authentication of the user device to communicate with the first server, via a session with the first server; receive the second response from the third server; generate a second token, based on the second response, the second token including information to authenticate the user device to communicate with the first server via a session with the first server; send the second token to the user device; and establish a session with the user device based on the second token. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A computer-readable medium comprising:
a plurality of instructions which, when executed by one or more processors associated with a first server, cause the one or more processors to; receive a first token from a user device, the first token including information to authenticate the user device to communicate with the first server via a session with the first server; determine whether the first token is valid; send an instruction to the user device, based on determining that the first token is invalid, the instruction requesting the user device to provide a set of credentials to a second server; receive a first response from the user device, the first response being provided to the user device by the second server, based on the user device providing the set of credentials to the second server, the first response including information identifying whether the user device is authenticated to communicate with the first server, via a session with the first server; send the first response to a third server, the third server generating a second response based on the first response, the second response including a response to indicate authentication of the user device to communicate with the first server, via a session with the first server; receive the second response from the third server; decrypt the second response; validate a signature associated with the second response, based on decrypting the second response; generate a second token, based on validating the second response, the second token including information to authenticate the user device to communicate with the first server via a session with the first server; send the second token to the user device; and establish a session between the user device and the first server, based on the second token or based on determining that the first token is valid. - View Dependent Claims (18, 19, 20, 21, 22, 23)
Specification