Authentication of a device with a service provider
First Claim
Patent Images
1. A method comprising:
- maintaining, on a non-transitory storage medium, user information associated with a user account for a service;
receiving, from a user device, a request to authenticate the user device to the service, wherein the request to authenticate the user device to the service comprises verification information, wherein the verification information comprises a username and a password;
sending, based on the verification information, authentication information to the user device, wherein the authentication information comprises a token;
receiving a request, from the user device, to access the service, wherein the request to access the service comprises the authentication information;
determining that the authentication information is no longer valid;
checking a validity of the verification information;
sending, in response to determining that the verification information is valid, new authentication information to the user device;
authenticating, based on the new authentication information, the user device for access to the service; and
providing, to the user device, access to the service.
5 Assignments
0 Petitions
Accused Products
Abstract
A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and determining whether the security token is valid. Providing the service may also involve determining a session security token if the security token is valid and generating a service response including the session security token. Providing the service may further involve receiving a service request including the session security token, determining whether the session security token is valid, and, if the session security token is valid, generating a second service response.
-
Citations
20 Claims
-
1. A method comprising:
-
maintaining, on a non-transitory storage medium, user information associated with a user account for a service; receiving, from a user device, a request to authenticate the user device to the service, wherein the request to authenticate the user device to the service comprises verification information, wherein the verification information comprises a username and a password; sending, based on the verification information, authentication information to the user device, wherein the authentication information comprises a token; receiving a request, from the user device, to access the service, wherein the request to access the service comprises the authentication information; determining that the authentication information is no longer valid; checking a validity of the verification information; sending, in response to determining that the verification information is valid, new authentication information to the user device; authenticating, based on the new authentication information, the user device for access to the service; and providing, to the user device, access to the service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
at least one processor; and a non-transitory computer readable medium storing instructions that, when executed by the at least one processor, cause the system to; maintain user information associated with a user account for a service; receive, from a user device, a request to authenticate the user device to the service, wherein the request to authenticate the user device to the service comprises verification information, wherein the verification information comprises a username and a password; send, based on the verification information, authentication information to the user device, wherein the authentication information comprises a token; receive a request, from the user device, to access the service, wherein the request to access the service comprises the authentication information; determine that the authentication information is no longer valid; check a validity of the verification information; send, in response to determining that the verification information is valid, new authentication information to the user device; authenticate, based on the new authentication information, the user device for access to the service; and provide, to the user device, access to the service. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium storing instructions thereon that, when executed by a processor, cause a computer system to:
-
maintain user information associated with a user account for a service; receive, from a user device, a request to authenticate the user device to the service, wherein the request to authenticate the user device to the service comprises verification information, wherein the verification information comprises a username and a password; send, based on the verification information, authentication information to the user device, wherein the authentication information comprises a token; receive a request, from the user device, to access the service, wherein the request to access the service comprises the authentication information; determine that the authentication information is no longer valid; check a validity of the verification information; send, in response to determining that the verification information is valid, new authentication information to the user device; authenticate, based on the new authentication information, the user device for access to the service; and provide, to the user device, access to the service. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification