Transparent authentication process integration
First Claim
1. A method comprising:
- receiving, at a server, a request from a client to take an action with respect to an electronic document residing at the client;
obtaining, at the server and in response to the request, a software program comprising instructions operable to cause one or more data processing apparatus to perform operations effecting an authentication procedure;
sending the software program to the client for use in identifying a current user and controlling the action with respect to the electronic document based on the current user and document-permissions information associated with the electronic document;
receiving an updated authentication procedure;
receiving a subsequent request from the client to take the action with respect to the electronic document;
obtaining, at the server and in response to the subsequent request, a new software program comprising instructions operable to cause one or more data processing apparatus to perform operations effecting an updated authentication procedure; and
sending the new software program to the client for use in identifying the current user and controlling the action with respect to the electronic document based on the current user and the document-permissions information associated with the electronic document.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and techniques to provide transparent authentication integration. In general, in one implementation, the technique includes: receiving a request from a client to take an action with respect to an electronic document, in response to the request, obtaining an authentication process, and sending the authentication process to the client for use in identifying a current user and controlling the action with respect to the electronic document based on the current user and document-permissions information associated with the electronic document. Obtaining the authentication process can involve requesting and receiving the authentication process from a second server. The authentication process can use an existing interface provided by the client to communicate authentication information to the server.
157 Citations
20 Claims
-
1. A method comprising:
-
receiving, at a server, a request from a client to take an action with respect to an electronic document residing at the client; obtaining, at the server and in response to the request, a software program comprising instructions operable to cause one or more data processing apparatus to perform operations effecting an authentication procedure; sending the software program to the client for use in identifying a current user and controlling the action with respect to the electronic document based on the current user and document-permissions information associated with the electronic document; receiving an updated authentication procedure; receiving a subsequent request from the client to take the action with respect to the electronic document; obtaining, at the server and in response to the subsequent request, a new software program comprising instructions operable to cause one or more data processing apparatus to perform operations effecting an updated authentication procedure; and sending the new software program to the client for use in identifying the current user and controlling the action with respect to the electronic document based on the current user and the document-permissions information associated with the electronic document. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a client that sends an authentication procedure update request to a server in response to client processing of information received from the server, wherein the information received from the server specifies one or more acceptable authentication procedures; the server that receives the authentication procedure update request, and in response to the client, the server obtains and sends a software program comprising instructions operable to cause one or more data processing apparatus to perform operations effecting an authentication procedure; and wherein the client uses the software program to identify the current user and control an action with respect to an electronic document based on the current user and document-permissions information associated with the electronic document, and wherein the action comprises an action taken with respect to the electronic document subsequent to opening the electronic document at the client, and wherein the server receives a subsequent request from the client to take the action with respect to the electronic document, obtains, in response to the subsequent request, a new authentication process, and sends the new authentication process to the client for use in identifying the current user and controlling the action with respect to the electronic document based on the current user and the document-permissions information associated with the electronic document. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification