Leveraging a persistent connection to access a secured service
First Claim
1. A method, performed by a client, of leveraging a connection with an intermediary to access a secured service, the method comprising:
- establishing an authenticated connection between a client and an intermediary;
receiving a user request for access to a secured service;
submitting, by the client, a request, which is based on the user request for access to a secured service, to the intermediary that is physically distinct of the secured service;
receiving, from the intermediary, constrained authorization information that has been electronically negotiated by the secured service and the intermediary, the constrained authorization information being electronically negotiated in response to the client request; and
submitting, by the client, the constrained authorization information to the secured service to establish a direct authenticated connection between the client and the secured service independent of the authenticated connection between the client and the intermediary.
7 Assignments
0 Petitions
Accused Products
Abstract
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client, and brokering a connection between the client and a secured service based on a second request from the client by leveraging the persistent connection with the client. The brokering may occur before the client attempts to connect to the secured service directly and the connection may be established between the client and the secured service without provision by the client of authentication information duplicative or additional to authentication information provided by the client to establish the persistent connection.
-
Citations
62 Claims
-
1. A method, performed by a client, of leveraging a connection with an intermediary to access a secured service, the method comprising:
-
establishing an authenticated connection between a client and an intermediary; receiving a user request for access to a secured service; submitting, by the client, a request, which is based on the user request for access to a secured service, to the intermediary that is physically distinct of the secured service; receiving, from the intermediary, constrained authorization information that has been electronically negotiated by the secured service and the intermediary, the constrained authorization information being electronically negotiated in response to the client request; and submitting, by the client, the constrained authorization information to the secured service to establish a direct authenticated connection between the client and the secured service independent of the authenticated connection between the client and the intermediary. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method, performed by an intermediary, of leveraging a connection with a client to provide the client with access to a secured service, the method comprising:
-
establishing an authenticated connection between a client and an intermediary; receiving, from the client, a request for access to a secured service that is physically distinct of the intermediary; electronically negotiating constrained authorization information with the secured service in response to receiving the client request; and submitting the constrained authorization information to the client to enable the client to submit the constrained authorization information to the secured service to establish a direct authenticated connection between the client and the secured service independent of the authenticated connection between the client and the intermediary. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A method, performed by a secured service, of allowing a client access based on an authenticated connection between the client and an intermediary, the method comprising:
-
receiving, at a secured service and from an intermediary that has established an authenticated connection with a client, notification of a request by the client to access the secured service; electronically negotiating constrained authorization information with the intermediary in response to receiving the notification; receiving, from the client, the constrained authorization information that has been submitted to the client by the intermediary, and establishing a direct authenticated connection with the client independent of the authenticated connection between the client and the intermediary based on the received constrained authorization information. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62)
-
Specification