Leveraging a persistent connection to access a secured service
First Claim
1. A method comprising:
- establishing, using at least one processor, a connection with a client;
receiving, from the client, a request to access a secured service;
submitting, in response to the request received from the client, a request to the secured service for authorization information;
receiving the authorization information from the secured service; and
sending the received authorization information to the client to enable the client to access the secured service independent of the connection.
5 Assignments
0 Petitions
Accused Products
Abstract
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client, and brokering a connection between the client and a secured service based on a second request from the client by leveraging the persistent connection with the client. The brokering may occur before the client attempts to connect to the secured service directly and the connection may be established between the client and the secured service without provision by the client of authentication information duplicative or additional to authentication information provided by the client to establish the persistent connection.
-
Citations
20 Claims
-
1. A method comprising:
-
establishing, using at least one processor, a connection with a client; receiving, from the client, a request to access a secured service; submitting, in response to the request received from the client, a request to the secured service for authorization information; receiving the authorization information from the secured service; and sending the received authorization information to the client to enable the client to access the secured service independent of the connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
establishing, using at least one processor, a connection with an intermediary system; sending, to the intermediary system, a request to access a secured service; receiving, from the intermediary system, authorization information generated by the secured service; accessing the secured service independent of the connection through the use of the authorization information; and synchronizing local data with remote data stored by the secured service. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An system comprising:
-
at least one processor; and at least one non-transitory computer readable storage medium storing instructions thereon that, when executed by the at least one processor, cause the system to; establish a connection with a client; receive, from the client, a request to access a secured service; submit, in response to the request received from the client, a request for authorization information from the secured service; receive authorization information from the secured service; and send the received authorization information to the client to enable the client to access the secured service independent of the connection.
-
Specification