LEVERAGING A PERSISTENT CONNECTION TO ACCESS A SECURED SERVICE
First Claim
1. A method, comprising:
- receiving, at a server and from a client, a request to access a secured service that is separate from the server;
receiving, from the client, authentication information to authenticate the client with the server;
authenticating, based on the authentication information, the client with the server;
sending, based on an authentication of the client with the server, authorization information to the client to enable the client to access the secured service independent of the server.
5 Assignments
0 Petitions
Accused Products
Abstract
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client, and brokering a connection between the client and a secured service based on a second request from the client by leveraging the persistent connection with the client. The brokering may occur before the client attempts to connect to the secured service directly and the connection may be established between the client and the secured service without provision by the client of authentication information duplicative or additional to authentication information provided by the client to establish the persistent connection.
88 Citations
20 Claims
-
1. A method, comprising:
-
receiving, at a server and from a client, a request to access a secured service that is separate from the server; receiving, from the client, authentication information to authenticate the client with the server; authenticating, based on the authentication information, the client with the server; sending, based on an authentication of the client with the server, authorization information to the client to enable the client to access the secured service independent of the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
receiving, at a secured service, a request for a client to access the secured service; receiving, from an intermediary system that is separate from the secured service, authentication information for the client; authenticating, based on the authentication information from the intermediary system, the client with the secured service; and providing, to the client and in response to authenticating the client, access to the secured service. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system, comprising:
-
at least one processor; and at least one non-transitory computer readable storage medium storing instructions thereon that, when executed by the at least one processor, cause the system to; receive, from a client, a request to access a secured service that is separate from the server; receive, from the client, authentication information to authenticate the client with the server; authenticate, based on the authentication information, the client with the server; send, based on an authentication of the client with the server, authorization information to the client to enable the client to access the secured service independent of the server - View Dependent Claims (19, 20)
-
Specification