USER DEVICE SECURITY MANAGER
First Claim
1. An apparatus comprising:
- a processor-implemented identification module to identify a first request issued from an application to access remote resources associated with a web service, the application configured to execute at a user device and separate from the user device security manager;
a processor-implemented acquisition module to acquire security information associated with the application in response to the identifying of the first request, the security information including at least one of an application identification, an access scope or a nonce for the application; and
a processor implemented communication module to transmit a second request to the web service to authenticate the application by the web service at least based on the application identification.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed to authenticate and authorize a user for web services using user devices. In various embodiments, a method may comprise: identifying, by a user device security manager executing at a user device corresponding to a user of a web service, a first request issued from an application to access remote resources associated with the web service, the application executing at the user device and separate from the user device security manager; acquiring, by the user device security manager, security information of the application in response to the identifying of the first request, the security information including at least one of an application identification, an access scope or a nonce of the application; and transmitting a second request from the user device security manager to the web service to authenticate the application by the web service based, at least in part, on the application identification.
-
Citations
20 Claims
-
1. An apparatus comprising:
-
a processor-implemented identification module to identify a first request issued from an application to access remote resources associated with a web service, the application configured to execute at a user device and separate from the user device security manager; a processor-implemented acquisition module to acquire security information associated with the application in response to the identifying of the first request, the security information including at least one of an application identification, an access scope or a nonce for the application; and a processor implemented communication module to transmit a second request to the web service to authenticate the application by the web service at least based on the application identification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method comprising:
-
identifying, by a user device security manager of a user device corresponding to a user of a web service, a first request issued from an application to access remote resources associated with the web service, the application executing at the user device and separate from the user device security manager; acquiring, by the user device security manager, security information associated with the application in response to the identifying of the first request, the security information including at least one of an application identification, an access scope or a nonce for the application; and transmitting, using one or more processors, a second request from the user device security manager to the web service to authenticate the application by the web service based, at least in part, on the application identification. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory machine-readable storage device storing instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
identifying, by a user device security manager of a user device corresponding to a user of a web service, a first request issued from an application to access remote resources associated with the web service, the application executing at the user device and separate from the user device security manager; acquiring, by the user device security manager, security information associated with the application in response to the identifying of the first request, the security information including at least one of an application identification, an access scope or a nonce for the application; and transmitting a second request from the user device security manager to the web service to authenticate the application by the web service at least based on the application identification.
-
Specification