Cross-native application authentication application
First Claim
1. A user device, comprising:
- a memory to store;
first authentication information,the first authentication information being used to grant access to a resource associated with a first application, andconfiguration information relating to a second application,the second application being different than the first application,the first application and the second application operating on the user device; and
one or more processors to;
receive an authentication request, from the second application, requesting second authentication information,determine, based on the authentication request, that the memory stores the configuration information relating to the second application,determine, based on the configuration information, that the first authentication information includes a first portion of the second authentication information and does not include a second portion of the second authentication information,provide, to a server device and based on determining that the first authentication information does not include the second portion of the second authentication information, a request for the second portion of the second authentication information,receive, from the server device and based on the request, the second portion of the second authentication information,store the second portion of the second authentication information in the memory,generate an authentication response, to the authentication request, using the first authentication information and the second portion of the second authentication information, andsend the authentication response, to the second application, to permit access to a resource associated with the second application.
1 Assignment
0 Petitions
Accused Products
Abstract
A user device stores first authentication information used to grant access to a resource associated with a first application, and configuration information relating to a second application. The user device receives an authentication request from the second application requesting second authentication information. Based on the configuration information relating to the second application, the user device determines whether the first authentication information contains some or all of the requested second authentication information. The user device generates an authentication response to the authentication request, using the first authentication information, and sends the authentication response to the second application in order to permit access to a resource associated with the second application.
-
Citations
20 Claims
-
1. A user device, comprising:
-
a memory to store; first authentication information, the first authentication information being used to grant access to a resource associated with a first application, and configuration information relating to a second application, the second application being different than the first application, the first application and the second application operating on the user device; and one or more processors to; receive an authentication request, from the second application, requesting second authentication information, determine, based on the authentication request, that the memory stores the configuration information relating to the second application, determine, based on the configuration information, that the first authentication information includes a first portion of the second authentication information and does not include a second portion of the second authentication information, provide, to a server device and based on determining that the first authentication information does not include the second portion of the second authentication information, a request for the second portion of the second authentication information, receive, from the server device and based on the request, the second portion of the second authentication information, store the second portion of the second authentication information in the memory, generate an authentication response, to the authentication request, using the first authentication information and the second portion of the second authentication information, and send the authentication response, to the second application, to permit access to a resource associated with the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium storing instructions, the instructions comprising:
a plurality of instructions that, when executed by a processor of a device, cause the processor to; store, in the device, first authentication information that is used to grant access to a resource associated with a first application; store, in the device, configuration information relating to a second application, the second application being different than the first application; receive an authentication request, from the second application, requesting second authentication information; determine, based on the authentication request, that the device stores the configuration information relating to the second application; determine, based on the configuration information, that the first authentication information includes a first portion of the second authentication information and does not include a second portion of the second authentication information, the second authentication information being used to grant access to a resource associated with the second application; provide, to a server device and based on determining that the first authentication information does not include the second portion of the second authentication information, a request for the second portion of the second authentication information; receive, from the server device and based on the request, the second portion of the second authentication information; generate an authentication response, to the authentication request, using the first authentication information and the second portion of the second authentication information; and send the authentication response, to the second application, to permit access to the resource associated with the second application. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A method, comprising:
-
storing, by a device, first authentication information that is used to grant access to a resource associated with a first application; storing, by the device, configuration information relating to a second application, the second application being different than the first application, the first application and the second application operating on the device; receiving, by the device, an authentication request from the second application, the authentication request requesting second authentication information and corresponding to a request for access to a resource associated with the second application; determining, by the device and based on the authentication request, that the device stores the configuration information relating to the second application; determining, by the device and based on the configuration information, that the first authentication information includes a first portion of the second authentication information and does not include a second portion of the second authentication information, the second authentication information being used by the second application to access to the resource associated with the second application; providing, by the device, to a server device, and based on determining that the first authentication information does not include the second portion of the second authentication information, a request for the second portion of the second authentication information; receiving, by the device, from the server device, and based on the request, the second portion of the second authentication information; generating, by the device, an authentication response, to the authentication request, using the first authentication information and the second portion of the second authentication information; and sending, by the device, the authentication response, to the second application, to permit access to the resource associated with the second application. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification