×

Protecting user credentials from a computing device

  • US 9,191,394 B2
  • Filed: 02/08/2012
  • Issued: 11/17/2015
  • Est. Priority Date: 02/08/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented by a credential service, the method comprising:

  • receiving at the credential service, from a computing device, both a request to provide user credentials associated with a user of the computing device to an identity provider and first secure session parameters for a first secure session previously established between the computing device and the identity provider, the credential service being implemented by one or more additional computing devices separate from the computing device;

    receiving, from the computing device, information authenticating the user to the credential service in order for the user credentials to be provided to the identity provider, with an amount of information used to authenticate being greater if the computing device is an unknown device than if the computing device is a known device;

    negotiating and establishing, using second secure session parameters, a second secure session between the credential service and the identity provider while using the computing device as an intermediary communicating data between the credential service and the identity provider, the second secure session parameters being unknown to the computing device and agreed based on renegotiation of the first secure session;

    providing the user credentials associated with the user to the identity provider via the second secure session;

    communicating from the credential service with the identity provider to renegotiate the second secure session and establish, using third secure session parameters determined during the second secure session, a third secure session between the credential service and the identity provider while using the computing device as an intermediary communicating data between the credential service and the identity provider; and

    providing the third secure session parameters to the computing device to allow communication between the computing device and the identity provider using the third secure session parameters.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×