Encryption-based session establishment
First Claim
1. A method comprising:
- receiving, by a first server, a first token from a user device,the first token including information to authenticate the user device to communicate with the first server;
determining, by the first server, that the first token is invalid;
sending, by the first server, a login instruction to the user device, responsive to the determining that the first token is invalid,the login instruction requesting the user device to provide a set of credentials to a second server,the set of credentials being provided by the user device to the second server based on the login instruction, andthe second server being different from the first server;
receiving, by the first server, a first response from the user device,the first response being provided to the user device by the second server based on the user device providing the set of credentials to the second server, andthe first response including information identifying whether the user device is authenticated to communicate with the first server;
sending, by the first server, the first response to a third server,the third server generating a second response based on the first response,the third server being different from the first server and the second server,the second response including information that indicates that the user device is authenticated to communicate with the first server, andthe second response being sent by the third server to the first server;
receiving, by the first server, the second response from the third server;
generating, by the first server, a second token, based on receiving the second response,the second token including information to authenticate the user device to communicate with the first server; and
sending, by the first server, the second token to the user device.
1 Assignment
0 Petitions
Accused Products
Abstract
A first server is configured to receive a first token from a user device, determine whether the first token is valid, request the user device to provide a set of credentials to a second server, based on determining that the first token is invalid, and receive a first response from the user device. The first response may include information identifying whether the user device is authenticated to communicate with the first server. The first server is further configured to send the first response to a third server. The third server may generate a second response to indicate authentication of the user device to communicate with the first server. The first server is further configured to receive the second response from the third server, generate a second token, based on receiving the second response, and send the second token to the user device.
-
Citations
23 Claims
-
1. A method comprising:
-
receiving, by a first server, a first token from a user device, the first token including information to authenticate the user device to communicate with the first server; determining, by the first server, that the first token is invalid; sending, by the first server, a login instruction to the user device, responsive to the determining that the first token is invalid, the login instruction requesting the user device to provide a set of credentials to a second server, the set of credentials being provided by the user device to the second server based on the login instruction, and the second server being different from the first server; receiving, by the first server, a first response from the user device, the first response being provided to the user device by the second server based on the user device providing the set of credentials to the second server, and the first response including information identifying whether the user device is authenticated to communicate with the first server; sending, by the first server, the first response to a third server, the third server generating a second response based on the first response, the third server being different from the first server and the second server, the second response including information that indicates that the user device is authenticated to communicate with the first server, and the second response being sent by the third server to the first server; receiving, by the first server, the second response from the third server; generating, by the first server, a second token, based on receiving the second response, the second token including information to authenticate the user device to communicate with the first server; and sending, by the first server, the second token to the user device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
a first server, at least partially implemented in hardware, to; receive a first token from a user device, the first token including information to authenticate the user device to communicate with the first server via a session with the first server; determine that the first token is invalid; send a login instruction to the user device responsive to the determining that the first token is invalid, the login instruction requesting the user device to provide a set of credentials to a second server, the set of credentials being provided by the user device to the second server based on the login instruction, and the second server being different from the first server; receive a first response from the user device, the first response being provided to the user device by the second server based on the user device providing the set of credentials to the second server, and the first response including information identifying whether the user device is authenticated to communicate with the first server; send the first response to a third server, the third server generating a second response based on the first response, the third server being different from the first server and the second server, and the second response indicating authentication of the user device to communicate with the first server; receive the second response from the third server; generate a second token, based on the second response, the second token including information that indicates that the user device is authenticated to communicate with the first server, and the second response being sent by the third server to the first server; send the second token to the user device; and establish a session with the user device based on the second token. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A non-transitory computer-readable medium storing instructions, the instructions comprising:
a plurality of instructions which, when executed by one or more processors associated with a first server, cause the one or more processors to; receive a first token from a user device, the first token including information to authenticate the user device to communicate with the first server; determine whether that the first token is invalid; send a login instruction to the user device, based on responsive to the determining that the first token is invalid, the login instruction requesting the user device to provide a set of credentials to a second server, the set of credentials being provided by the user device to the second server based on the login instruction, and the second server being different from the first server; receive a first response from the user device, the first response being provided to the user device by the second server based on the user device providing the set of credentials to the second server, and the first response including information identifying whether the user device is authenticated to communicate with the first server; send the first response to a third server, the third server generating a second response based on the first response, the third server being different from the first server and the second server, the second response including information that indicates that the user device is authenticated to communicate with the first server, via a session with the first server, and the second response being sent by the third server to the first server; receive the second response from the third server; generate a second token, based on the second response, the second token including information to authenticate the user device to communicate with the first server via a session with the first server; send the second token to the user device; and establish a session between the user device and the first server based on the second token. - View Dependent Claims (18, 19, 20, 21, 22, 23)
Specification