CROSS-NATIVE APPLICATION AUTHENTICATION APPLICATION
First Claim
1. A user device, comprising:
- a memory to store;
first authentication information,the first authentication information being used to grant access to a resource associated with a first application,configuration information relating to the second application,the second application being different than the first application,the first application and the second application operating on the user device; and
one or more processors to;
receive an authentication request, from the second application, requesting second authentication information,determine, based on the authentication request, that the memory stores the configuration information relating to the second application,determine, based on the configuration information, whether the first authentication information contains some or all of the second authentication information,generate an authentication response, to the authentication request, using the first authentication information based on determining that the first authentication information contains some or all of the second authentication information, andsend the authentication response, to the second application, to permit access to a resource associated with the second application.
1 Assignment
0 Petitions
Accused Products
Abstract
A user device stores first authentication information used to grant access to a resource associated with a first application, and configuration information relating to a second application. The user device receives an authentication request from the second application requesting second authentication information. Based on the configuration information relating to the second application, the user device determines whether the first authentication information contains some or all of the requested second authentication information. The user device generates an authentication response to the authentication request, using the first authentication information, and sends the authentication response to the second application in order to permit access to a resource associated with the second application.
19 Citations
20 Claims
-
1. A user device, comprising:
-
a memory to store; first authentication information, the first authentication information being used to grant access to a resource associated with a first application, configuration information relating to the second application, the second application being different than the first application, the first application and the second application operating on the user device; and one or more processors to; receive an authentication request, from the second application, requesting second authentication information, determine, based on the authentication request, that the memory stores the configuration information relating to the second application, determine, based on the configuration information, whether the first authentication information contains some or all of the second authentication information, generate an authentication response, to the authentication request, using the first authentication information based on determining that the first authentication information contains some or all of the second authentication information, and send the authentication response, to the second application, to permit access to a resource associated with the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable medium storing instructions, the instructions comprising:
a plurality of instructions that, when executed by a processor of a device, cause the processor to; receive an authentication request, from a first application, requesting first authentication information; determine, based on the authentication request, that configuration information relates to the first application; determine, based on the configuration information, whether the device stores second authentication information, that relates to the first authentication information, the second authentication information being used to grant access to a resource associated with a second application; generate an authentication response, to the authentication request, using the second authentication information based on determining that the second authentication information relates to the first authentication information; and send the authentication response, to the first application, to permit access to a resource associated with the first application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A method, comprising:
-
receiving, by a device, an authentication request from a first application, the authentication request corresponding to a request for access to a resource associated with the first application; determining, by the device and based on the authentication request, that configuration information relates to the first application; determining, by the device and based on the configuration information, whether authentication information satisfies the authentication request, the authentication information being used by a second application to access to a resource associated with the second application; generating, by the device, an authentication response, to the authentication request, using the authentication information based on determining that the authentication information satisfies the authentication request; and sending, by the device, the authentication response, to the first application, to permit access to the resource associated with the first application. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification