Techniques for managing a secure communication session
First Claim
Patent Images
1. A method implemented and residing within a computer-readable storage medium that is executed by a processor of a server, the processor configured to perform the method, comprising:
- detecting, by the server, a request for a secure communication session between a non-browser application and a server;
the request initiated by the non-browser application;
establishing, by the server, the secure communication session between the non-browser application and the server via a browser, the browser acts as an intermediary to initially establish the secure communication session and the secure communication session uses encryption, wherein the browser acts as an intermediary by acquiring a secure token and supplying the secure token to the non-browser application before the browser shuts down, the non-browser application includes an interface to interact with the browser but does not require the browser and is not embedded within the browser;
mapping, by a server, a session cookie that the browser uses with the secure communication session to the secure token and instructing the browser to supply the secure token to the non-browser application; and
maintaining, by the server, the secure communication session after the browser is shut down by translating the secure token, by the server, into the session cookie expected by the server, wherein the secure token is supplied by the non-browser application, the server maintains the session cookie and its mapping to the secure token and when the secure token is supplied by the non-browser application, the server translates the secure token to the session cookie allowing the secure communication session to continue unabated without the presence of the browser.
16 Assignments
0 Petitions
Accused Products
Abstract
Techniques for managing a secure communication session are provided. A non-browser application utilizes a browser to establish a secure communication session with a server. The session cookie set in the browser is mapped by the server to a secret token that is supplied via the browser to the non-browser application. The browser is then closed and the secure communication session between the server and the non-browser application continues unabated via the secret token.
10 Citations
20 Claims
-
1. A method implemented and residing within a computer-readable storage medium that is executed by a processor of a server, the processor configured to perform the method, comprising:
-
detecting, by the server, a request for a secure communication session between a non-browser application and a server;
the request initiated by the non-browser application;establishing, by the server, the secure communication session between the non-browser application and the server via a browser, the browser acts as an intermediary to initially establish the secure communication session and the secure communication session uses encryption, wherein the browser acts as an intermediary by acquiring a secure token and supplying the secure token to the non-browser application before the browser shuts down, the non-browser application includes an interface to interact with the browser but does not require the browser and is not embedded within the browser; mapping, by a server, a session cookie that the browser uses with the secure communication session to the secure token and instructing the browser to supply the secure token to the non-browser application; and maintaining, by the server, the secure communication session after the browser is shut down by translating the secure token, by the server, into the session cookie expected by the server, wherein the secure token is supplied by the non-browser application, the server maintains the session cookie and its mapping to the secure token and when the secure token is supplied by the non-browser application, the server translates the secure token to the session cookie allowing the secure communication session to continue unabated without the presence of the browser. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method implemented and residing within a computer-readable storage medium that is executed by a processor of a network to perform the method on a client, comprising:
-
requesting, by the client, a secure socket layer (SSL) virtual private network (VPN) connection with a server, a request for the SSL VPN made to a browser; receiving, by the client, a secret token from the browser that the browser acquired as a mapping to a session cookie for the SSL VPN connection from the server; supplying, by the client, the secret token directly to the server to login and establish the SSL VPN connection with the server, the browser acts as an intermediary to initially establish the SSL VPN connection and SSL VPN connection uses encryption, the browser acquires the secret token from the server and supplies the secret token to the client and then the browser shuts down; shutting down, by the client, the browser while maintaining the SSL VPN connection with the server via the secret token that the server translates to the session cookie, the server maintains the session cookie without the presence of the browser and when the browser is shut down using the secret token supplied to the server and the server dynamically translates the secret token into the session cookie; and processing, by the client, the method independent of the browser. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A multiprocessor-implemented system, comprising:
-
a non-browser application implemented in a computer-readable medium and to execute on a client of a network; and a server to execute over the network and interact with the client; wherein the non-browser application is configured to interact with a browser to establish a secure communication session with the server over the network, the browser acts as an intermediary to initially establish the secure communication session and the secure communication session uses encryption, the browser acts as an intermediary by acquiring a secret token from the server and supplying the secret token to the non-browser application and then the browser shuts down, the non-browser application includes an interface to interact with the browser but does not require the browser and is not embedded within the browser, the server configured to interact with the browser to set a session cookie for the secure communication session and provide the secret token to the non-browser application via the browser that maps to the session cookie, the non-browser application further configured to resupply the secret token to the server independent from the browser to initiate the secure communication session with the server and the browser closed thereafter while the secure communication session continues between the non-browser application and the server, the server dynamically translates the secret token into the session cookie when the session cookie is no longer available from the bowser that is closed and the secure communication session continues unabated via the secret token that the server translates back to the session cookie, the secret token is supplied to the sever independent of the browser and without the presence of the browser. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification