Synchronizing authentication sessions between applications
First Claim
Patent Images
1. A method, comprising:
- authenticating a first client application with a service provider;
receiving, via a client computing device, a first authentication token from the first client application;
requesting, via the client computing device, a second authentication token from a token exchange service using the first authentication token;
configuring, via the client computing device, a second client application to use the second authentication token in order to access a resource of the service provider;
accessing, by the second client application, the resource of the service provider using the second authentication token; and
wherein the first and second client applications are executed in the client computing device, one of the first or second client applications comprises a native application, and another one of the first or second client applications comprises a browser-based application.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for synchronizing authentication sessions between applications. In one embodiment, a first authentication token is received from a first application in response to determining that the first application is authenticated with a service provider. A second authentication token is requested from a token exchange service associated with the service provider. The second authentication token is requested using the first authentication token. The second application is configured to use the second authentication token in order to access a resource of the service provider.
42 Citations
20 Claims
-
1. A method, comprising:
-
authenticating a first client application with a service provider; receiving, via a client computing device, a first authentication token from the first client application; requesting, via the client computing device, a second authentication token from a token exchange service using the first authentication token; configuring, via the client computing device, a second client application to use the second authentication token in order to access a resource of the service provider; accessing, by the second client application, the resource of the service provider using the second authentication token; and wherein the first and second client applications are executed in the client computing device, one of the first or second client applications comprises a native application, and another one of the first or second client applications comprises a browser-based application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system, comprising:
-
a client computing device; and instructions executable in the client computing device, wherein when executed the instructions cause the client computing device to at least; authenticate a first client application with a service provider; receive a first authentication token from the first client application; request a second authentication token from a token exchange service using the first authentication token; configure a second client application to use the second authentication token in order to access a resource of the service provider; access, by the second client application, the resource of the service provider using the second authentication token; and wherein the first and second client applications are executed in the client computing device, one of the first or second client applications comprises a native application, and another one of the first or second client applications comprises a browser-based application. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable medium embodying instructions executable in a client computing device, wherein when executed the instructions cause the client computing device to at least:
-
authenticate a first client application with a service provider; receive a first authentication token from the first client application; request a second authentication token from a token exchange service using the first authentication token; configure a second client application to use the second authentication token in order to access a resource of the service provider; access, by the second client application, a resource of the service provider using the second authentication token; and wherein the first and second client applications are executed in the client computing device, one of the first or second client applications comprises a native application, and another one of the first or second client applications comprises a browser-based application. - View Dependent Claims (20)
-
Specification