Method and system for secured inter-application communication in mobile devices
First Claim
1. A method for secured inter-application communication, comprising:
- requesting, by a first application running on a mobile computing device, that a first socket be opened by an operating system of the mobile computing device, the first socket being associated with the first application;
receiving, by the first application, an identifier of the first socket from the operating system, the identifier being a first port ID associated with the mobile computing device and defining an endpoint of the first socket;
requesting, by the first application, that a second application running on the mobile computing device be provided with the first port ID;
requesting by the second application, in response to receiving the first port ID, that a second socket be opened by the operating system of the mobile computing device, the second socket being associated with the second application;
receiving, by the second application, an identifier of the second socket from the operating system, the identifier being a second port ID associated with the mobile computing device and defining an endpoint of the second socket;
requesting by the second application, in response to receiving the first port ID, that the second socket be coupled to the first socket;
establishing a bi-directional channel via the first and second sockets; and
transferring information from the first application to the second application via the bi-directional channel, the information causing functions of the second application to be made available via an interface of the first application.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure describes a method for accessing network resources which includes receiving by a first application in a mobile computing device sign-in information from a user and enabling the user to sign in to a second application with the first application to access network resources from a resource server based on (a) a first application identification (ID) of the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an authorization grant from the resource server to enable the second application to access the network resources, the mobile computing device coupled with the resource server via a network.
-
Citations
10 Claims
-
1. A method for secured inter-application communication, comprising:
-
requesting, by a first application running on a mobile computing device, that a first socket be opened by an operating system of the mobile computing device, the first socket being associated with the first application; receiving, by the first application, an identifier of the first socket from the operating system, the identifier being a first port ID associated with the mobile computing device and defining an endpoint of the first socket; requesting, by the first application, that a second application running on the mobile computing device be provided with the first port ID; requesting by the second application, in response to receiving the first port ID, that a second socket be opened by the operating system of the mobile computing device, the second socket being associated with the second application; receiving, by the second application, an identifier of the second socket from the operating system, the identifier being a second port ID associated with the mobile computing device and defining an endpoint of the second socket; requesting by the second application, in response to receiving the first port ID, that the second socket be coupled to the first socket; establishing a bi-directional channel via the first and second sockets; and transferring information from the first application to the second application via the bi-directional channel, the information causing functions of the second application to be made available via an interface of the first application. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer program product comprising a non-transitory computer readable medium having computer-readable program instructions embodied therein, the computer readable program instructions adapted to be executed by one or more processors to implement a method for secured inter-application communication, the program instructions include:
-
requesting, by a first application running on a mobile computing device, that a first socket be opened by an operating system of the mobile computing device, the first socket being associated with the first application; receiving, by the first application, an identifier of the first socket from the operating system, the identifier being a first port ID associated with the mobile computing device and defining an endpoint of the first socket; requesting, by the first application, that a second application running on the mobile computing device be provided with the first port ID; requesting, by the second application, in response to receiving the first port ID, that a second socket be opened by the operating system of the mobile computing device, the second socket being associated with the second application; receiving, by the second application, an identifier of the second socket from the operating system, the identifier being a second port ID associated with the mobile computing device and defining an endpoint of the second socket; requesting, by the second application, in response to receiving the first port ID, that the second socket be coupled to the first socket; establishing a bi-directional channel via the first and second sockets; and transferring information from the first application to the second application via the bi-directional channel, the information causing functions of the second application to be made available via an interface of the first application. - View Dependent Claims (7, 8, 9, 10)
-
Specification