CLIENT APPLICATION ASSISTED AUTOMATIC USER LOG IN
First Claim
1. A system comprising:
- a processor;
a first module configured to control the processor to obtain an authentication token, the authentication token comprising data to authenticate a user to a server;
a second module configured to control the processor to generate a uniform resource locator (URL) and a file, the URL comprising a first part of the token, the file comprising a second part of the token and a set of instructions; and
a third module configured to control the processor to execute the URL, the URL redirecting execution to the set of instructions in the file, wherein the set of instructions combine the first part and the second part to re-create the token and transmit the re-created token to the server to authenticate the user.
4 Assignments
0 Petitions
Accused Products
Abstract
Some systems allow a user to access content using both a native client application and a web interface. In these systems, the client application authorized to access a user account can assist with automatically logging a user into the web interface through the use of authentication tokens. In response to an authentication request, the client application can select a token and split it into multiple parts. One piece can be embedded in a URL and a second piece can be stored in a file. The file can also contain browser executable instructions that when executed combine the two pieces to re-create the token and send the re-created token to a server to authenticate the user. The client application can forward the URL to the browser, which can direct the browser to the file. The browser can execute the instructions thereby authenticating the user.
267 Citations
24 Claims
-
1. A system comprising:
-
a processor; a first module configured to control the processor to obtain an authentication token, the authentication token comprising data to authenticate a user to a server; a second module configured to control the processor to generate a uniform resource locator (URL) and a file, the URL comprising a first part of the token, the file comprising a second part of the token and a set of instructions; and a third module configured to control the processor to execute the URL, the URL redirecting execution to the set of instructions in the file, wherein the set of instructions combine the first part and the second part to re-create the token and transmit the re-created token to the server to authenticate the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method comprising:
-
receiving from a server a secret, the secret generated on the server as an authentication token linked to a user account; splitting the secret to generate a first part and a second part; generating a file comprising the first part and instructions, which when executed combine the first part and the second part to re-create the secret and send the re-created secret to the server; generating a uniform resource locator (URL) including the second part; and executing, via a processor, the URL, wherein the URL redirects execution to the instructions in the file. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A client device comprising:
-
a processor; a memory configured to store a client application and a web browser application, the client application linked to a user authenticated with a server; a first module configured to control the processor to receive a request to authenticate the user for access to data on the server through the web browser application, the request received from the client application; a second module configured to control the processor to generate a uniform resource locator (URL) and a file, the URL comprising a first secret, the file comprising a second secret and a set of instructions, wherein the first secret and the second secret are generated from a one-time use authentication token; a third module configured to control the processor to execute the URL in the web browser application, wherein executing the URL causes the web browser application to execute the set of instructions in the file, wherein the set of instructions combine the first secret and the second secret to generate an authentication token and transmit the authentication token to the server, whereby automatically authenticating the user to access data on the server through the web browser application. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A synchronized online content management system comprising:
-
a processor; a first module configured to control the processor to send a plurality of authentication tokens for a user account to a client application executing on a client device, the client application authenticated and authorized to access data in the user account; a second module configured to control the processor to receive a generated authentication token from a web browser executing on the client device; a third module configured to control the processor to verify the generated authentication token matches an authentication token in the plurality of authentication tokens; and a fourth module configured to control the processor to send an authentication message. - View Dependent Claims (23, 24)
-
Specification