AUTHORIZATION BASED ON ACCESS TOKEN
First Claim
Patent Images
1. A mobile device, comprising:
- an authenticator to generate an authorization request with a secure token to access a server; and
a processor to access the server using an authorization token, if the authenticator receives the authorization token in response to the authorization request,wherein the authenticator embeds the authorization request with a plurality of parameters to allow the server to determine, based upon at least one of the plurality of parameters, if the authorization token should be given to the mobile device; and
wherein the plurality of parameters is chosen from the group consisting of;
a requesting mobile client device;
a third-party application; and
a scope of usage.
0 Assignments
0 Petitions
Accused Products
Abstract
A mobile device may include an authenticator and a processor. The authenticator may generate an authorization request with a secure token to access a server. The processor may access the server using an authorization token, if the authenticator receives the authorization token in response to the authorization request. The authenticator may embed the authorization request with a plurality of parameters to allow the server to determine, based upon at least one of the plurality of parameters, if the authorization token should be given to the mobile device.
15 Citations
21 Claims
-
1. A mobile device, comprising:
-
an authenticator to generate an authorization request with a secure token to access a server; and a processor to access the server using an authorization token, if the authenticator receives the authorization token in response to the authorization request, wherein the authenticator embeds the authorization request with a plurality of parameters to allow the server to determine, based upon at least one of the plurality of parameters, if the authorization token should be given to the mobile device; and wherein the plurality of parameters is chosen from the group consisting of; a requesting mobile client device; a third-party application; and a scope of usage. - View Dependent Claims (2, 3, 4, 5)
-
-
6-10. -10. (canceled)
-
11. A method of a mobile device, comprising:
-
generating, by an authenticator, an authorization request with a secure token to access a server; and accessing, by a processor, the server using an authorization token, if the authenticator receives the authorization token in response to the authorization request, wherein the authenticator embeds the authorization request with a plurality of parameters to allow the server to determine, based upon at least one of the plurality of parameters, if the authorization token should be given to the mobile device. and wherein the plurality of parameters is chosen from the group consisting of; a requesting mobile client device; a third-party application; and a scope of usage. - View Dependent Claims (12, 13, 14, 15)
-
-
16-20. -20. (canceled)
-
21. A method for implementation by one or more data processors forming part of at least one computing device, the method comprising
generating, by at least one data processor, an authorization request with a secure token to access a server; - and
accessing, by at least one data processor processor, the server using an authorization token, if the authenticator receives the authorization token in response to the authorization request, wherein the authorization request is embedded with a plurality of parameters to allow the server to determine, based upon at least one of the plurality of parameters, if the authorization token should be given to the mobile device; and wherein the plurality of parameters comprise;
a requesting mobile client device;
a third-party application, and a scope of usage.
- and
Specification