LEVERAGING A PERSISTENT CONNECTION TO ACCESS A SECURED SERVICE
First Claim
1. A method comprising;
- establishing an authenticated connection with a client;
receiving, from the client, a request for authorization to access a service;
in response to receiving the request for authorization, allowing the client to request access to the service from a computer system associated with the service;
in response to the client requesting access to the service, receiving from the computer system associated with the service temporary access information for the service; and
transmitting the temporary access information to the client to enable the client to provide the temporary access information to the computer system associated with the service to establish an authorized connection between the client and the service.
5 Assignments
0 Petitions
Accused Products
Abstract
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client, and brokering a connection between the client and a secured service based on a second request from the client by leveraging the persistent connection with the client. The brokering may occur before the client attempts to connect to the secured service directly and the connection may be established between the client and the secured service without provision by the client of authentication information duplicative or additional to authentication information provided by the client to establish the persistent connection.
-
Citations
20 Claims
-
1. A method comprising;
-
establishing an authenticated connection with a client; receiving, from the client, a request for authorization to access a service; in response to receiving the request for authorization, allowing the client to request access to the service from a computer system associated with the service; in response to the client requesting access to the service, receiving from the computer system associated with the service temporary access information for the service; and transmitting the temporary access information to the client to enable the client to provide the temporary access information to the computer system associated with the service to establish an authorized connection between the client and the service. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
one or more processors; and one or more memories operatively coupled to at least one of the one or more processors and having instructions stored thereon that, when executed by at least one of the one or more processors, cause the apparatus to; establish an authenticated connection with a client; receive, from the client, a request for authorization to access a service; in response to receiving the request for authorization, allow the client to request access to the service from a computer system associated with the service; in response to the client requesting access to the service, receive from the computer system associated with the service temporary access information, and transmit the temporary access information to the client to enable the client to provide the temporary access information to the computer system associated with the service to establish an authorized connection between the client and the service. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. At least one non-transitory computer-readable medium storing computer-readable instructions that, when executed by one or more computing devices, cause at least one of the one or more computing devices to:
-
establish an authenticated connection with the client; receive, from the client, a request for authorization to access the service; in response to receiving the request for authorization, allow the client to request access to the service from a computer system associated with the service; in response to the client requesting access to the service, receive from the computer system associated with the service temporary access information, and transmit the temporary access information to the client to enable the client to provide the temporary access information to the computer system associated with the service to establish an authorized connection between the client and the service. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification