Authentication system and method for embedded applets
First Claim
1. A web-accessible security system, comprising:
- a server system connected to a security network that receives information, which includes video images, from security devices on the security network, wherein the video images are generated by video camera security devices, and wherein the server system generates authentication tokens associated with user credentials for each user, and stores the authentication tokens in an authentication database; and
one or more user devices that access the information including the video images from the security devices via the server system using embedded applets that receive the authentication tokens that were provided by the server system, save the authentication tokens as applet tokens, include the applet tokens in Universal Resource Locators (URLs) that identify the video images on the server system, and then include the URLs in messages to the server system; and
wherein in response to the server system receiving the messages sent from the embedded applets which include the URLs that identify the video images on the server system and that include the applet tokens, the server system finds a match between the a let tokens in the URLs and the authentication tokens to identify the users as trusted users and responds to the embedded applets with the video images.
8 Assignments
0 Petitions
Accused Products
Abstract
A system and method for authenticating user requests issued from embedded applets running on web-accessible user devices. The server system generates authentication tokens associated with user credentials, in response to user requests for HTML pages that include the embedded applets. The server system stores the authentication tokens on the server system, and includes the authentication tokens in URLs within applet tags in the HTML pages returned to the user devices. When the applets download and request content from the server system, the applets supply the previously included authentication tokens in the URLs that identify the requested content. Upon finding a match between the applet-supplied authentication tokens and the stored authentication tokens, the server identifies the user as a trusted user, and responds with the requested content. This can be used to eliminate HTTP-based authentication challenges for subsequent user access.
-
Citations
38 Claims
-
1. A web-accessible security system, comprising:
-
a server system connected to a security network that receives information, which includes video images, from security devices on the security network, wherein the video images are generated by video camera security devices, and wherein the server system generates authentication tokens associated with user credentials for each user, and stores the authentication tokens in an authentication database; and one or more user devices that access the information including the video images from the security devices via the server system using embedded applets that receive the authentication tokens that were provided by the server system, save the authentication tokens as applet tokens, include the applet tokens in Universal Resource Locators (URLs) that identify the video images on the server system, and then include the URLs in messages to the server system; and wherein in response to the server system receiving the messages sent from the embedded applets which include the URLs that identify the video images on the server system and that include the applet tokens, the server system finds a match between the a let tokens in the URLs and the authentication tokens to identify the users as trusted users and responds to the embedded applets with the video images. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for accessing information, which includes video images, from security devices in a web-accessible security system including a security network, a server system, and user devices running embedded applets, wherein the video images are generated by video camera security devices, the method comprising:
-
the server system connecting to the security network and receiving the information including the video images from security devices on the security network; the server system generating authentication tokens associated with user credentials for each user; storing the authentication tokens in an authentication database; the user devices accessing the information including the video images from the security devices via the server system using the embedded applets; and the embedded applets receiving the authentication tokens that were provided by the server system, saving the authentication tokens as applet tokens, including the applet tokens in URLs that identify the video images on the server system, and then including the URLs in messages to the server system; and in response to the server system receiving the messages sent from the embedded applets which include the URLs that identify the video images on the server system and that include the applet tokens, the server system finding a match between the applet tokens in the URLs and the authentication tokens to identify the users as trusted users and responding to the embedded applets with the video images. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A web-accessible security system, comprising:
-
a server system connected to a security network that receives information, which includes video images, from security devices on the security network, wherein the video images are generated by video camera security devices, and wherein the server system generates authentication tokens associated with user credentials for each user, and stores the authentication tokens in an authentication database; and one or more user devices that access the information including the video images from the security devices via the server system using embedded applets that receive the authentication tokens that were provided by the server system, save the authentication tokens as applet tokens, and include the applet tokens in messages to the server system; wherein the user devices access the server system over a network cloud, the user devices include web browsers which request HTML pages on the server system, the HTML pages including the embedded applets, the embedded applets accessing the information including the video images from the security devices, the server system sending messages which include an applet tag within the HTML pages requested by the user devices, the applet tag including a first Uniform Resource Locator (“
URL”
) that includes the authentication tokens, and the server system removes the stored authentication tokens for each user after a timeout period.
-
-
38. A system for validating user access to information from security devices in a security system, the system comprising:
-
a server system connected to a security network that receives information, which includes video images, from the security devices on the security network, wherein the video images are generated by video camera security devices, and wherein the server system generates authentication tokens associated with user credentials for each user, and stores the authentication tokens in an authentication database; and one or more user devices of the users including web browsers requesting HTML pages from the server, wherein the HTML pages include embedded applets, wherein the embedded applets are downloaded from the server system and access the information including the video images from the security devices via the server system, and wherein the embedded applets receive the authentication tokens that were provided by the server system, save the authentication tokens as applet tokens on the user devices, and include the applet tokens in messages to the server system when accessing the information including the video images from the security devices, and wherein the server system compares the applet tokens in the received messages to the stored authentication tokens to validate the users.
-
Specification