×

Authentication and authorization of a privilege-constrained application

  • US 9,819,673 B1
  • Filed: 06/24/2015
  • Issued: 11/14/2017
  • Est. Priority Date: 06/24/2015
  • Status: Active Grant
First Claim
Patent Images

1. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of execution by one or more processors, cause the one or more processors to:

  • assign an application key to a privilege-constrained application that is configured to load onto a client computing device, the privilege-constrained application loaded onto the client computing device with limited privileges, wherein the privilege-constrained application is authorized to perform at least one permitted action and lacks permission to perform at least one blocked action in connection with a client account;

    receive a request for privileged access to the client account through an online resource, the request including a user identifier associated with the client account and the application key;

    determine that the application key matches a stored application key associated with the privilege-constrained application and associated with the user identifier;

    provide a single use authorization (SUA) code allocated for the privilege-constrained application and associated with the user identifier upon the successful determination;

    receive a candidate authorization code and user identifier;

    validate the candidate authorization code based on the SUA code provided; and

    provide a permitted action token based on the validate operation, the permitted action token is presented by the privilege-constrained application to an access service, and the permitted action token indicates that the privilege-constrained application is authorized to perform the at least one permitted action and lacks permission to perform the at least one blocked action in connection with the online resource.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×