MOBILE DEVICE USER AUTHENTICATION FOR ACCESSING PROTECTED NETWORK RESOURCES
First Claim
1. A method, comprising:
- receiving, by a processor of a computing device, a first authentication token;
transmitting, by the processor, an authentication request using the first authentication token;
receiving, in response to the authentication request, a second authentication token;
transmitting, by the processor, a resource access token request using the second authentication token;
receiving, in response to the resource access token request, a resource access token; and
transmitting, by the processor, a computing resource access request using the resource access token.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for user authentication for accessing protected applications by computing devices includes receiving, by a processor of a mobile computing device, a first authentication token. The method further includes transmitting an authentication request using the first authentication token. The method further includes receiving, in response to the authentication request, a second authentication token. The method further includes transmitting a resource access token request using the second authentication token. The method further includes receiving, in response to the resource access token request, a resource access token. The method further includes transmitting a computing resource access request using the resource access token.
-
Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a processor of a computing device, a first authentication token; transmitting, by the processor, an authentication request using the first authentication token; receiving, in response to the authentication request, a second authentication token; transmitting, by the processor, a resource access token request using the second authentication token; receiving, in response to the resource access token request, a resource access token; and transmitting, by the processor, a computing resource access request using the resource access token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing device comprising:
-
a memory; and a processor, operatively coupled to the memory, to; receive a first authentication token; transmit an authentication request using the first authentication token; receive, in response to the authentication request, a second authentication token; transmit a resource access token request using the second authentication token; receive, in response to the resource access token request, a resource access token; and transmit a computing resource access request using the resource access token. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer-readable non-transitory storage medium comprising executable instructions that, when executed by a processor of a computing device, cause the processor to:
-
receive a first authentication token; transmit, by the processor, an authentication request using the first authentication token; receive, in response to the authentication request, a second authentication token; transmit, by the processor, a resource access token request using the second authentication token; receive, in response to the resource access token request, a resource access token; and transmit, by the processor, a computing resource access request using the resource access token. - View Dependent Claims (18, 19, 20)
-
Specification