System and Method for Controlling Access
First Claim
1. A method for controlling access to a target system, comprising:
- an access device receiving a first request over a network from a user device, the first request comprising a request on behalf of a first application on the user device to access a platform, the first request including a device identifier uniquely identifying the user device;
the access device authenticating a user of the user device using a user credential associated with the user;
the access device storing the device identifier in association with a login identifier in response to authentication of the user;
the access device receiving a second request from the user device over the network, the second request comprising a request on behalf of a second application on the user device to access the platform, the second request including the device identifier;
the access device determining that the user has previously authenticated based on a match between the device identifier received in the second request and the device identifier stored in association with the login identifier; and
the access device allowing the second application to access to the platform based on the determination that the user previously authenticated, without requiring a separate user credential verification for the second application.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for controlling access to multiple applications on a computing device are provided. One embodiment of a system includes an access device configured to: receive a request to access a first application and a device identifier; authenticate the user using a user credential associated with the user and store the device identifier in association with a login identifier in response to authentication of the user. The access device can be further configured to receive a request to access a second application and the device identifier. The access device can allow access to the second application based on the previous authentication of the user.
-
Citations
25 Claims
-
1. A method for controlling access to a target system, comprising:
-
an access device receiving a first request over a network from a user device, the first request comprising a request on behalf of a first application on the user device to access a platform, the first request including a device identifier uniquely identifying the user device; the access device authenticating a user of the user device using a user credential associated with the user; the access device storing the device identifier in association with a login identifier in response to authentication of the user; the access device receiving a second request from the user device over the network, the second request comprising a request on behalf of a second application on the user device to access the platform, the second request including the device identifier; the access device determining that the user has previously authenticated based on a match between the device identifier received in the second request and the device identifier stored in association with the login identifier; and the access device allowing the second application to access to the platform based on the determination that the user previously authenticated, without requiring a separate user credential verification for the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for controlling access to a target system, comprising:
-
an access device in communication with a platform, the access device configured to; receive a first request from a user device, the first request comprising a request to access the platform on behalf of a first application on the user device, the first request including a device identifier that uniquely identifies the user device; authenticate a user of the user device using a user credential associated with the user; store the device identifier in association with a login identifier in response to authentication of the user; receive a second request from the user device, the second request comprising a request to access the platform on behalf of a second application on the user device, the second request including the device identifier; and compare the device identifier stored in association with the login identifier and the device identifier received in the second request and, in response to determining a match exists, allow access to the platform on behalf of the second application without a separate credential verification for the second application. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product comprising a non-transitory computer readable medium storing a set of computer instructions executable by a processor to perform a method comprising:
-
receiving a first request over a network from a user device, the first request comprising a request on behalf of a first application on the user device to access a platform, the first request including a device identifier that uniquely identifies the user device; authenticating a user of the user device using a user credential associated with the user; storing the device identifier in association with a login identifier in response to authentication of the user; receiving a second request from the user device over the network, the second request comprising a request on behalf of a second application on the user device to access the platform, the second request including the device identifier; determining that the user has previously authenticated based on a match between the device identifier received in the second request and the device identifier stored in association with the login identifier; and allowing the second application to access to the platform based on the determination that the user previously authenticated, without requiring a separate user credential verification for the second application. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
Specification