Authentication management services
First Claim
1. A non-transitory computer-readable medium embodying at least one program executable in a client computing device, the at least one program comprising:
- code that decrypts a security credential associated with a user account stored by a first authentication management client in response to receiving a master security credential from an input device of the client computing device, wherein the security credential is stored in the client computing device in an encrypted form;
code that sends a first authentication request using the first authentication management client by way of an authentication protocol to an authentication service associated with a first secured resource of a network site, the first authentication request specifying the security credential associated with the user account;
code that accesses the first secured resource after being authenticated by the authentication service in response to the first authentication request;
code that imports the user account and the decrypted security credential associated with the user account from the first authentication management client into a second authentication management client configured to interact with a second secured resource;
code that sends a second authentication request using the second authentication management client by way of the authentication protocol to the authentication service, the second authentication request specifying the decrypted security credential;
code that accesses the second secured resource after being authenticated by the authentication service in response to the second authentication request;
code that, in response to receiving a denial of an access request to another secured resource, sends an account upgrade request for the user account using the second authentication management client to the authentication service, wherein the account upgrade request seeks a permission for the user account associated with the user to access the another secured resource and specifies a set of information about the user; and
code that accesses the another secured resource of the network site after the user account receives the permission to access the another secured resource.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for authentication management services, where authentication services of network sites may support authentication management clients associated with different authentication management services. An authentication request is obtained by way of an authentication protocol from an authentication management client executed in a client computing device. The authentication request specifies a security credential associated with a user account. The user account at the client computing device is authenticated for access to at least one secured resource of a network site in response to the authentication request and in response to the authentication management client being supported.
44 Citations
17 Claims
-
1. A non-transitory computer-readable medium embodying at least one program executable in a client computing device, the at least one program comprising:
-
code that decrypts a security credential associated with a user account stored by a first authentication management client in response to receiving a master security credential from an input device of the client computing device, wherein the security credential is stored in the client computing device in an encrypted form; code that sends a first authentication request using the first authentication management client by way of an authentication protocol to an authentication service associated with a first secured resource of a network site, the first authentication request specifying the security credential associated with the user account; code that accesses the first secured resource after being authenticated by the authentication service in response to the first authentication request; code that imports the user account and the decrypted security credential associated with the user account from the first authentication management client into a second authentication management client configured to interact with a second secured resource; code that sends a second authentication request using the second authentication management client by way of the authentication protocol to the authentication service, the second authentication request specifying the decrypted security credential; code that accesses the second secured resource after being authenticated by the authentication service in response to the second authentication request; code that, in response to receiving a denial of an access request to another secured resource, sends an account upgrade request for the user account using the second authentication management client to the authentication service, wherein the account upgrade request seeks a permission for the user account associated with the user to access the another secured resource and specifies a set of information about the user; and code that accesses the another secured resource of the network site after the user account receives the permission to access the another secured resource. - View Dependent Claims (2)
-
-
3. A method, comprising:
-
obtaining, in at least one computing device, a first authentication request by way of an authentication protocol from a first authentication management client application executed in a first client computing device, the first authentication request specifying a first security credential associated with a first user account; authenticating, in the at least one computing device, the first user account submitted by the first client computing device for access to at least one secured resource of a network site hosted by at least one other computing device in response to the first authentication request; obtaining, in the at least one computing device, a second authentication request by way of the authentication protocol from a second authentication management client application executed in a second client computing device, the second authentication request specifying a second security credential associated with a second user account; authenticating, in the at least one computing device, the second user account submitted by the second client computing device for access to the at least one secured resource of the network site in response to the second authentication request; and wherein the first authentication management client application and the second authentication management client application are different authentication management client applications deployed by different providers of authentication management services. - View Dependent Claims (4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a computing device; and an application executable in the computing device, the application comprising; logic that obtains a first authentication request by way of an authentication protocol from a first authentication management client application executed in a first client computing device, the first authentication request specifying a first security credential associated with a first user account; logic that authenticates the first user account submitted by the first client computing device for access to at least one secured resource of a network site hosted by at least one other computing device in response to the first authentication request; logic that obtains a second authentication request by way of the authentication protocol from a second authentication management client application executed in a second client computing device, the second authentication request specifying a second security credential associated with a second user account; logic that authenticates the second user account submitted by the second client computing device for access to the at least one secured resource of the network site in response to the second authentication request; and wherein the first authentication management client application and the second authentication management client application are different authentication management client applications deployed by different providers of authentication management services. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
Specification