SIMPLIFIED USER REGISTRATION
First Claim
1. A method comprising:
- receiving, at a computing device, a security token identifier and a request to access one or more resources of the computing device, the security token identifier comprising information that identifies a security token;
sending, from the computing device to a server computing system, a request to identify domains having a trust relationship with a domain associated with the computing device;
receiving, at the computing device from the server computing system, a response to the request to identify domains having a trust relationship with the domain associated with the computing device, the response comprising information that identifies one or more domains each having a trust relationship with the domain associated with the computing device;
determining that an entry in a first data store matches the security token identifier, the first data store associated with a first domain of the one or more domains each having a trust relationship with the domain associated with the computing device;
in response to the determining that an entry in the first data store matches the security token identifier, updating a local data store at the computing device such that, in the local data store, the security token identifier is associated with first domain information that identifies the first domain; and
granting the requested access to one or more resources of the computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer-readable media are provided. Some embodiments include receiving, at a computing device, a security token identifier and a request to access one or more resources of the computing device. The computing device obtains information that identifies one or more domains each having a trust relationship with the domain associated with the computing device. The computing device determines that an entry in a first data store associated with a first domain of the one or more domains matches the security token identifier. In response to the determining that an entry in the first data store matches the security token identifier, the computing device updates a local data store such that, in the local data store, the security token identifier is associated with first domain information that identifies the first domain. The computing device grants the requested access to one or more resources of the computing device.
21 Citations
19 Claims
-
1. A method comprising:
-
receiving, at a computing device, a security token identifier and a request to access one or more resources of the computing device, the security token identifier comprising information that identifies a security token; sending, from the computing device to a server computing system, a request to identify domains having a trust relationship with a domain associated with the computing device; receiving, at the computing device from the server computing system, a response to the request to identify domains having a trust relationship with the domain associated with the computing device, the response comprising information that identifies one or more domains each having a trust relationship with the domain associated with the computing device; determining that an entry in a first data store matches the security token identifier, the first data store associated with a first domain of the one or more domains each having a trust relationship with the domain associated with the computing device; in response to the determining that an entry in the first data store matches the security token identifier, updating a local data store at the computing device such that, in the local data store, the security token identifier is associated with first domain information that identifies the first domain; and granting the requested access to one or more resources of the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
receiving, at a computing device, a security token identifier and a request to access one or more resources of the computing device, the security token identifier comprising information that identifies a security token; sending, from the computing device to a server computing system, a request to identify domains having a trust relationship with a domain associated with the computing device; receiving, at the computing device from the server computing system, a response to the request to identify domains having a trust relationship with the domain associated with the computing device, the response comprising information that identifies one or more domains each having a trust relationship with the domain associated with the computing device; determining that an entry in a first data store matches the security token identifier, the first data store associated with a first domain of the one or more domains each having a trust relationship with the domain associated with the computing device; in response to the determining that an entry in the first data store matches the security token identifier, updating a local data store at the computing device such that, in the local data store, the security token identifier is associated with first domain information that identifies the first domain; and granting the requested access to one or more resources of the computing device.
-
-
11. A device comprising:
-
one or more processors; and one or more computer-readable media coupled to the one or more processors, the one or more computer-readable media storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising; receiving, at a computing device, a security token identifier and a request to access one or more resources of the computing device, the security token identifier comprising information that identifies a security token; sending, from the computing device to a server computing system, a request to identify domains having a trust relationship with a domain associated with the computing device; receiving, at the computing device from the server computing system, a response to the request to identify domains having a trust relationship with the domain associated with the computing device, the response comprising information that identifies one or more domains each having a trust relationship with the domain associated with the computing device; determining that an entry in a first data store matches the security token identifier, the first data store associated with a first domain of the one or more domains each having a trust relationship with the domain associated with the computing device; in response to the determining that an entry in the first data store matches the security token identifier, updating a local data store at the computing device such that, in the local data store, the security token identifier is associated with first domain information that identifies the first domain; and granting the requested access to one or more resources of the computing device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification