×

Authenticating mobile applications using policy files

  • US 9,736,126 B2
  • Filed: 12/04/2014
  • Issued: 08/15/2017
  • Est. Priority Date: 12/04/2014
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising a processor and memory to:

  • receive, via a first server, a key pair and a policy file associated with a mobile service from a second server, the policy file comprising a list of;

    a plurality of security objects to be authenticated,a plurality of computing devices to authenticate the security objects, andan order of authentication;

    distribute the key pair and the policy file;

    receive an authentication request from a mobile application;

    authenticate the mobile application based in part on the key pair and the policy file;

    generate a scope token with an application scope in response to authenticating the mobile application, the scope token comprising a signature based in part on the key pair;

    authenticate a client device corresponding to the mobile application and a user to generate a doubly-authenticated scope token comprising a device scope and application authenticity scope;

    send the doubly-authenticated scope token to a security gateway for user authentication;

    receive a trebly-authenticated scope token with a grant token request and send a grant token to the mobile application, the trebly authenticated scope token to include a user scope;

    receive the grant token from the mobile application; and

    generate and send an access token to the mobile application.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×