METHOD FOR AUTHORIZING ACCESS TO PROTECTED CONTENT
First Claim
1. Method for authorizing access to a third party application, called client (2), to protected resources owned by a user (1) and hosted in a server (3), the method comprising:
- the client being used by the user asking for a temporary token to the server;
in addition to responding to the client with said temporary token, the server sending a first SMS to the user, said first SMS providing means to authenticate the user;
authenticating the user by the means provided in previous two steps;
the user authorizing the client;
after the authentication of the user and authorization of the user to the client, the server sending a second SMS to the user providing some information needed to obtain an access token;
the client getting the information of the previous step from the user and the access token;
the client accessing protected resources using the access token.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention refers to a method for authorizing access to a third party application, called client (2), to protected resources owned by a user (1) and hosted in a server (3). The method comprising: the client being used by the user asking for a temporary token to the server; the server sending a first SMS to the user, said first SMS providing means to authenticate the user; authenticating the user by the means provided in previous two steps; the user authorizing the client; the server sending a second SMS to the user providing some information needed to obtain an access token; the client getting the information of the previous step from the user and the access token; the client accessing protected resources using the access token.
-
Citations
15 Claims
-
1. Method for authorizing access to a third party application, called client (2), to protected resources owned by a user (1) and hosted in a server (3), the method comprising:
-
the client being used by the user asking for a temporary token to the server; in addition to responding to the client with said temporary token, the server sending a first SMS to the user, said first SMS providing means to authenticate the user; authenticating the user by the means provided in previous two steps; the user authorizing the client; after the authentication of the user and authorization of the user to the client, the server sending a second SMS to the user providing some information needed to obtain an access token; the client getting the information of the previous step from the user and the access token; the client accessing protected resources using the access token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
Specification