Inter-application delegated authentication
First Claim
Patent Images
1. A method for authenticating an application executing on a client device, the method comprising:
- receiving an authentication request from a first application executing on a client device;
identifying, at a server remote from the client device, a second application executing on the client device to which authentication of the first application is delegable, the second application being previously authenticated with credentials associated with the client device;
transmitting an instruction to the first application to continue authentication via the second application; and
authenticating the first application with the credentials associated with the client device based on the first application continuing authentication via the second application.
4 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a system for delegating authentication of an untrusted application executing on a client device. For delegated authentication, an untrusted application relies on a trusted application executing in the same environment for authentication purposes. The delegated authentication process avoids requiring the user of the untrusted application to provide authentication credentials. The disclosed system for delegating authentication enables any trusted application executing in the same computing environment to authenticate the untrusted application.
-
Citations
32 Claims
-
1. A method for authenticating an application executing on a client device, the method comprising:
-
receiving an authentication request from a first application executing on a client device; identifying, at a server remote from the client device, a second application executing on the client device to which authentication of the first application is delegable, the second application being previously authenticated with credentials associated with the client device; transmitting an instruction to the first application to continue authentication via the second application; and authenticating the first application with the credentials associated with the client device based on the first application continuing authentication via the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable storage medium storing instructions for authenticating an application executing on a client device, the instructions when executed by a processor causes the processor to:
-
receive an authentication request from a first application executing on a client device; identify, at a server remote to the client device, a second application executing on the client device to which authentication of the first application is delegable, the second application being previously authenticated with credentials associated with the client device; transmit an instruction to the first application to continue authentication via the second application; and authenticate the first application with the credentials associated with the client device based on the first application continuing authentication via the second application. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer system, comprising:
-
a computer processor; and an authentication module operating remotely from a client device and configured to execute on the computer processor to; receive an authentication request from a first application executing on the client device, identify a second application executing on the client device to which authentication of the first application is delegable, the second application being previously authenticated with credentials associated with the client device, transmit an instruction to the first application to continue authentication via the second application, and authenticate the first application with the credentials associated with the client device based on the first application continuing authentication via the second application. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification