Methods and apparatus for delegated authentication token retrieval
First Claim
1. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
- intercept at an authorization client a request to access a first application such that the first application is at least temporarily prevented from receiving the request;
send from the authorization client to a client authorization module, an indication of the first application and an indication of a second application;
receive, at the authorization client, in response to the indication of the first application and the indication of the second application, and from the client authorization module, a first application token and a second application token, respectively, the first application token being uniquely associated with the first application and the second application token being uniquely associated with the second application;
associate, using the authorization client, the first application with the first application token such that communication between the first application and an application device associated with the first application is authenticated when the first application token is exchanged between the application device associated with the first application and the first application; and
associate, using the authorization client, the second application with the second application token such that communication between the second application and an application device associated with the second application is authenticated when the second application token is exchanged between the application device associated with the second application and the second application.
10 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, a non-transitory processor-readable medium includes code to cause a processor to send, from an authorization client on a device to a client authorization module, an indication of multiple applications installed on the device, and receive, at the authorization client and in response to the indication, multiple application tokens from the client authorization module. Each individual application token from the multiple application tokens received by the authorization client is uniquely associated with an application from the multiple applications installed on the device. The authorization client provides each application its associated application token such that each application from the multiple applications can use that application token in order to be authenticated to an application server associated with the application.
57 Citations
22 Claims
-
1. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
intercept at an authorization client a request to access a first application such that the first application is at least temporarily prevented from receiving the request; send from the authorization client to a client authorization module, an indication of the first application and an indication of a second application; receive, at the authorization client, in response to the indication of the first application and the indication of the second application, and from the client authorization module, a first application token and a second application token, respectively, the first application token being uniquely associated with the first application and the second application token being uniquely associated with the second application; associate, using the authorization client, the first application with the first application token such that communication between the first application and an application device associated with the first application is authenticated when the first application token is exchanged between the application device associated with the first application and the first application; and associate, using the authorization client, the second application with the second application token such that communication between the second application and an application device associated with the second application is authenticated when the second application token is exchanged between the application device associated with the second application and the second application. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus, comprising:
-
a memory; and a processor configured to implement an authorization client, the authorization client configured to send, at a first time, to a client authorization module, an application token request associated with a plurality of applications, subsequent to intercepting a request to launch an application from the plurality of applications such that the application is at least temporarily prevented from receiving the request to launch the application, the authorization client configured to receive, at a second time after the first time, in response to the application token request, (1) a set of application tokens associated with a first set of applications from the plurality of applications, and (2) an indication that the user is unauthorized to use each application from a second set of applications from the plurality of applications and mutually exclusive of the first set of applications, each application token from the set of application tokens being uniquely associated with an application from the first set of applications, the authorization client configured to provide each application from the first set of applications with its associated application token from the set of application tokens such that each application from the first set of applications is authenticated to an application server associated with that application when its associated application token is received at the application server. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An apparatus, comprising:
-
a memory; and a processor configured to implement a client authorization module, the client authorization module configured to receive, at a first time, from an authorization client, and subsequent to the authorization client receiving a request to access at least one application from a plurality of applications such that the at least one application is at least temporarily prevented from receiving the indication, an application token request associated with the plurality of applications, the client authorization module configured to send, at a second time after the first time, in response to the application token request, a plurality of tokens to the authorization client such that the authorization client associates each application from the plurality of applications with a uniquely associated token from the plurality of tokens, the client authorization module configured to receive an authentication request from an application module associated with an application from the plurality of applications, the authentication request including a token from the plurality of tokens and uniquely associated with that application, the client authorization module configured to send an authentication signal to the application module in response to the client authorization module verifying the token as a valid token for the application. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
receive, at an authorization client and at a first time, a request to access a first application such that the first application is at least temporarily prevented from receiving the request to access the first application; send, at a second time after the first time from the authorization client to a client authorization module and in response to the request to access the first application, a request for an application token for the first application; receive, at the authorization client and from the client authorization module, (1) the application token for the first application in response to the request for the application token for the first application, and (2) an application token for a second application from; associate, using the authorization client, the application token for the first application with the first application such that communication between the first application and an application device associated with the first application is authenticated when the application token for the first application is exchanged between the application device associated with the first application and the first application; associate, using the authorization client, the application token for the second application with the second application such that communication between the second application and an application device associated with the second application is authenticated when the application token for the second application is exchanged between the application device associated with the second application and the second application; and send, using the authorization client and, after associating the application token for the first application with the first application, the request to access the first application to the first application such that the first application communicates with the application device associated with the first application. - View Dependent Claims (19, 20, 21, 22)
-
Specification