System and method for controlling access
First Claim
Patent Images
1. A method for controlling access to a target system, comprising:
- at an access device including a hardware processor, receiving a first request over a network from a user device in a first communication session, the first request comprising a request on behalf of a first application on the user device to access a platform, the first request including a device identifier uniquely identifying the user device;
the access device authenticating a user of the user device using a user credential associated with the user;
the access device storing the device identifier in association with a login identifier in response to authentication of the user;
the access device receiving a second request from the user device over the network in a second communication session, the second request comprising a request on behalf of a second application on the user device to access the platform, the second request in the second communication session including the device identifier;
the access device determining that the user has previously authenticated based on a match between the device identifier received in the second request in the second communication session and the device identifier stored in association with the login identifier; and
the access device allowing the second application to access to the platform based on the determination that the user previously authenticated, without requiring a separate user credential verification for the second application.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for controlling access to multiple applications on a computing device are provided. One embodiment of a system includes an access device configured to: receive a request to access a first application and a device identifier; authenticate the user using a user credential associated with the user and store the device identifier in association with a login identifier in response to authentication of the user. The access device can be further configured to receive a request to access a second application and the device identifier. The access device can allow access to the second application based on the previous authentication of the user.
6 Citations
25 Claims
-
1. A method for controlling access to a target system, comprising:
-
at an access device including a hardware processor, receiving a first request over a network from a user device in a first communication session, the first request comprising a request on behalf of a first application on the user device to access a platform, the first request including a device identifier uniquely identifying the user device; the access device authenticating a user of the user device using a user credential associated with the user; the access device storing the device identifier in association with a login identifier in response to authentication of the user; the access device receiving a second request from the user device over the network in a second communication session, the second request comprising a request on behalf of a second application on the user device to access the platform, the second request in the second communication session including the device identifier; the access device determining that the user has previously authenticated based on a match between the device identifier received in the second request in the second communication session and the device identifier stored in association with the login identifier; and the access device allowing the second application to access to the platform based on the determination that the user previously authenticated, without requiring a separate user credential verification for the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for controlling access to a target system, comprising:
-
an access device in communication with a platform, the access device including a hardware processor and configured to; receive a first request from a user device in a first communication session, the first request comprising a request to access the platform on behalf of a first application on the user device, the first request including a device identifier that uniquely identifies the user device; authenticate a user of the user device using a user credential associated with the user; store the device identifier in association with a login identifier in response to authentication of the user; receive a second request from the user device in a second communication session, the second request comprising a request to access the platform on behalf of a second application on the user device, the second request including the device identifier; and compare the device identifier stored in association with the login identifier and the device identifier received in the second request in the second communication session and, in response to determining a match exists, allow access to the platform on behalf of the second application without a separate credential verification for the second application. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer program product comprising a non-transitory computer readable medium storing a set of computer instructions executable by a processor to perform a method comprising:
-
receiving a first request over a network from a user device in a first communication session, the first request comprising a request on behalf of a first application on the user device to access a platform, the first request including a device identifier that uniquely identifies the user device; authenticating a user of the user device using a user credential associated with the user; storing the device identifier in association with a login identifier in response to authentication of the user; receiving a second request from the user device over the network in a second communication session, the second request comprising a request on behalf of a second application on the user device to access the platform, the second request including the device identifier; determining that the user has previously authenticated based on a match between the device identifier received in the second request in the second communication session and the device identifier stored in association with the login identifier; and allowing the second application to access to the platform based on the determination that the user previously authenticated, without requiring a separate user credential verification for the second application. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
Specification