Leveraging a persistent connection to access a secured service
First Claim
1. A method, comprising:
- receiving, at a server and from a client, a request to access a secured service that is separate from the server;
receiving, from the client, authentication information to authenticate the client with the server;
authenticating, based on the authentication information, the client with the server by the server negotiating authorization information with the secured service;
sending, based on an authentication of the client with the server, the negotiated authorization information to the client to enable the client to access the secured service independent of the server.
5 Assignments
0 Petitions
Accused Products
Abstract
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client, and brokering a connection between the client and a secured service based on a second request from the client by leveraging the persistent connection with the client. The brokering may occur before the client attempts to connect to the secured service directly and the connection may be established between the client and the secured service without provision by the client of authentication information duplicative or additional to authentication information provided by the client to establish the persistent connection.
225 Citations
20 Claims
-
1. A method, comprising:
-
receiving, at a server and from a client, a request to access a secured service that is separate from the server; receiving, from the client, authentication information to authenticate the client with the server; authenticating, based on the authentication information, the client with the server by the server negotiating authorization information with the secured service; sending, based on an authentication of the client with the server, the negotiated authorization information to the client to enable the client to access the secured service independent of the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method, comprising:
-
receiving, at a secured service and from an intermediary system that is separate from the secured service, a request for a client to access the secured service; receiving, from the intermediary system, authentication information for the client; authenticating, based on the authentication information from the intermediary system, the client with the secured service by the secured service negotiating authorization information for the client with the intermediary system; and providing, to the client and in response to receiving the negotiated authorization information from the client, access to the secured service. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A system, comprising:
-
at least one server; and at least one non-transitory computer readable storage medium storing instructions thereon that, when executed by the at least one server, cause the system to; receive, from a client, a request to access a secured service that is separate from the at least one server; receive, from the client, authentication information to authenticate the client with the at least one server; authenticate, based on the authentication information, the client with the at least one server by the server negotiating the authorization information with the secured service; send, based on an authentication of the client with the at least one server, the negotiated authorization information to the client to enable the client to access the secured service independent of the at least one server. - View Dependent Claims (19, 20)
-
Specification