LEVERAGING A PERSISTENT CONNECTION TO ACCESS A SECURED SERVICE
First Claim
1. A method comprising:
- establishing, using at least one processor, a connection with an intermediary system;
sending, to the intermediary system, a request for authorization to access a secured service;
receiving, from the intermediary system, authorization information for accessing the secured service;
accessing, independent of the connection with the intermediary system, the secured service using the authorization information; and
synchronizing local data with remote data stored by the secured service.
5 Assignments
0 Petitions
Accused Products
Abstract
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client, and brokering a connection between the client and a secured service based on a second request from the client by leveraging the persistent connection with the client. The brokering may occur before the client attempts to connect to the secured service directly and the connection may be established between the client and the secured service without provision by the client of authentication information duplicative or additional to authentication information provided by the client to establish the persistent connection.
-
Citations
20 Claims
-
1. A method comprising:
-
establishing, using at least one processor, a connection with an intermediary system; sending, to the intermediary system, a request for authorization to access a secured service; receiving, from the intermediary system, authorization information for accessing the secured service; accessing, independent of the connection with the intermediary system, the secured service using the authorization information; and synchronizing local data with remote data stored by the secured service. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
one or more processors; and one or more memories operatively coupled to at least one of the one or more processors and having instructions stored thereon that, when executed by at least one of the one or more processors, cause the apparatus to; establish a connection with an intermediary system; send to the intermediary system, a request for authorization to access a secured service; receive from the intermediary system, authorization information for accessing the secured service; access, independent of the connection with the intermediary system, the secured service using the authorization information; and synchronize local data with remote data stored by the secured service. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. At least one non-transitory computer-readable medium storing computer-readable instructions that, when executed by one or more computing devices, cause at least one of the one or more computing devices to:
-
establish a connection with an intermediary system; send to the intermediary system, a request for authorization to access a secured service; receive from the intermediary system, authorization information for accessing the secured service; access, independent of the connection with the intermediary system, the secured service using the authorization information; and synchronize local data with remote data stored by the secured service. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification