Simplified user registration
First Claim
1. A method of registering a security token at a computing device, the method comprising:
- receiving, at a computing device, a security token identifier and a request to access one or more resources of the computing device, the security token identifier comprising static information that identifies a security token which has been presented at the computing device;
sending, from the computing device to a server computing system, a request to identify domains having a trust relationship with a domain associated with the computing device;
receiving, at the computing device from the server computing system, a response to the request to identify domains having a trust relationship with the domain associated with the computing device, the response comprising information that identifies one or more domains each having a trust relationship with the domain associated with the computing device;
determining that an entry in a first data store matches the security token identifier, the first data store associated with a first domain of the one or more domains each having a trust relationship with the domain associated with the computing device;
in response to the determining that an entry in the first data store matches the security token identifier, updating a local data store at the computing device such that, in the local data store, the security token identifier is associated with first domain information that identifies the first domain; and
granting the requested access to one or more resources of the computing device based on the trust relationship determined to exist between the domain associated with the computing device and the first domain.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer-readable media are provided. Some embodiments include receiving, at a computing device, a security token identifier and a request to access one or more resources of the computing device. The computing device obtains information that identifies one or more domains each having a trust relationship with the domain associated with the computing device. The computing device determines that an entry in a first data store associated with a first domain of the one or more domains matches the security token identifier. In response to the determining that an entry in the first data store matches the security token identifier, the computing device updates a local data store such that, in the local data store, the security token identifier is associated with first domain information that identifies the first domain. The computing device grants the requested access to one or more resources of the computing device.
-
Citations
19 Claims
-
1. A method of registering a security token at a computing device, the method comprising:
-
receiving, at a computing device, a security token identifier and a request to access one or more resources of the computing device, the security token identifier comprising static information that identifies a security token which has been presented at the computing device; sending, from the computing device to a server computing system, a request to identify domains having a trust relationship with a domain associated with the computing device; receiving, at the computing device from the server computing system, a response to the request to identify domains having a trust relationship with the domain associated with the computing device, the response comprising information that identifies one or more domains each having a trust relationship with the domain associated with the computing device; determining that an entry in a first data store matches the security token identifier, the first data store associated with a first domain of the one or more domains each having a trust relationship with the domain associated with the computing device; in response to the determining that an entry in the first data store matches the security token identifier, updating a local data store at the computing device such that, in the local data store, the security token identifier is associated with first domain information that identifies the first domain; and granting the requested access to one or more resources of the computing device based on the trust relationship determined to exist between the domain associated with the computing device and the first domain. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer-readable medium storing instructions that, when executed by one or more processors, cause the one or more processors to perform operations comprising:
-
receiving, at a computing device, a security token identifier and a request to access one or more resources of the computing device, the security token identifier comprising static information that identifies a security token which has been presented at the computing device; sending, from the computing device to a server computing system, a request to identify domains having a trust relationship with a domain associated with the computing device; receiving, at the computing device from the server computing system, a response to the request to identify domains having a trust relationship with the domain associated with the computing device, the response comprising information that identifies one or more domains each having a trust relationship with the domain associated with the computing device; determining that an entry in a first data store matches the security token identifier, the first data store associated with a first domain of the one or more domains each having a trust relationship with the domain associated with the computing device; in response to the determining that an entry in the first data store matches the security token identifier, updating a local data store at the computing device such that, in the local data store, the security token identifier is associated with first domain information that identifies the first domain; and granting the requested access to one or more resources of the computing device based on the trust relationship determined to exist between the domain associated with the computing device and the first domain.
-
-
11. A computing device comprising:
-
one or more processors; and one or more computer-readable media coupled to the one or more processors, the one or more computer-readable media storing instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising; receiving, at the computing device, a security token identifier and a request to access one or more resources of the computing device, the security token identifier comprising static information that identifies a security token which has been presented at the computing device; sending, from the computing device to a server computing system, a request to identify domains having a trust relationship with a domain associated with the computing device; receiving, at the computing device from the server computing system, a response to the request to identify domains having a trust relationship with the domain associated with the computing device, the response comprising information that identifies one or more domains each having a trust relationship with the domain associated with the computing device; determining that an entry in a first data store matches the security token identifier, the first data store associated with a first domain of the one or more domains each having a trust relationship with the domain associated with the computing device; in response to the determining that an entry in the first data store matches the security token identifier, updating a local data store at the computing device such that, in the local data store, the security token identifier is associated with first domain information that identifies the first domain; and granting the requested access to one or more resources of the computing device based on the trust relationship determined to exist between the domain associated with the computing device and the first domain. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification