Proxy bypass login for applications on mobile devices
First Claim
Patent Images
1. A method comprising:
- authenticating, at a system, a user of a mobile device;
receiving, at the system via an intermediate server, a first request from the mobile device to install a software application on the mobile device;
transmitting, from the system via the intermediate server, data to the mobile device comprising the software application and a first secure ID, wherein the first secure ID indicates to the intermediate server that the user has been authenticated to the system;
receiving, at the system via the intermediate server, a second request from the mobile device to authorize the software application, the second request comprising a second secure ID, wherein the first secure ID is encrypted to generate the second secure ID, the first secure ID being previously transmitted with the software application to the mobile device;
decrypting, at the system, the second secure ID;
evaluating, at the system, the second secure ID for validity; and
transmitting, from the system via the intermediate server, a response to the mobile device in accordance with the evaluation.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, an intermediate server receives a request with a secure ID to authorize a software application, transmits the secure ID to a system, receives an access token from the system indicating that the software application has been authorized, evaluates the access token for validity, and transmits a response to the mobile device indicating the software application is authorized.
-
Citations
19 Claims
-
1. A method comprising:
-
authenticating, at a system, a user of a mobile device; receiving, at the system via an intermediate server, a first request from the mobile device to install a software application on the mobile device; transmitting, from the system via the intermediate server, data to the mobile device comprising the software application and a first secure ID, wherein the first secure ID indicates to the intermediate server that the user has been authenticated to the system; receiving, at the system via the intermediate server, a second request from the mobile device to authorize the software application, the second request comprising a second secure ID, wherein the first secure ID is encrypted to generate the second secure ID, the first secure ID being previously transmitted with the software application to the mobile device; decrypting, at the system, the second secure ID; evaluating, at the system, the second secure ID for validity; and transmitting, from the system via the intermediate server, a response to the mobile device in accordance with the evaluation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. An apparatus comprising:
- one or more processors; and
a memory coupled to the processors comprising instructions executable by the processors, the processors operable when executing the instructions to;authenticate, at a system, a user of a mobile device; receive, at the system via an intermediate server, a first request from the mobile device to install a software application on the mobile device; transmit, from the system via the intermediate server, data to the mobile device comprising the software application and a first secure ID, wherein the first secure ID indicates to the intermediate server that the user has been authenticated to the system; receive, at the system via the intermediate server, a second request from the mobile device to authorize the software application, the second request comprising a second secure ID, wherein the first secure ID is encrypted to generate the second secure ID, the first secure ID being previously transmitted with the software application to the mobile device; decrypt, at the system, the second secure ID; evaluate, at the system, the second secure ID for validity; and transmit, from the system via the intermediate server, a response to the mobile device in accordance with the evaluation.
- one or more processors; and
-
19. One or more computer-readable non-transitory storage media embodying software that is operable when executed to:
-
authenticate, at a system, a user of a mobile device; receive, at the system via an intermediate server, a first request from the mobile device to install a software application on the mobile device; transmit, from the system via the intermediate server, data to the mobile device comprising the software application and a first secure ID, wherein the first secure ID indicates to the intermediate server that the user has been authenticated to the system; receive, at the system via the intermediate server, a second request from the mobile device to authorize the software application, the second request comprising a second secure ID, wherein the first secure ID is encrypted to generate the second secure ID, the first secure ID being previously transmitted with the software application to the mobile device; decrypt, at the system, the second secure ID; evaluate, at the system, the second secure ID for validity; and transmit, from the system via the intermediate server, a response to the mobile device in accordance with the evaluation.
-
Specification