Systems and methods for authenticating an online user using a secure authorization server
First Claim
1. A secure authorization server for verifying an identity of an end user, said secure authorization server comprising at least one processor in communication with at least one memory, said secure authorization server programmed to:
- receive, from a computing client, an authentication request including a first redirection uniform resource indicator (URI);
associate the first redirection URI with responses to requests from the computing client;
transmit an authentication response to the computing client, wherein the authentication response includes an authorization code representative of a validation of the authentication request;
receive, from the computing client, a token request, wherein the token request includes the authorization code and a second redirection URI;
transmit, in response to validating the authorization code and determining that the second redirection URI matches the first redirection URI, a token response to the computing client, wherein the token response includes an access token having a lifetime;
receive, from the computing client, a user information request that includes the access token from the token response; and
transmit end-user data to the computing client in response to a validation of the access token.
1 Assignment
0 Petitions
Accused Products
Abstract
A secure authorization server computer system for verifying an identity of an end-user is provided. The computer system is programmed to receive, from a computing client, an authentication request at an authorization component. The authentication request includes a secure authentication request identifier. The computer system is also programmed to validate the authentication request at the authorization component by validating the secure authentication request identifier. The computer system is further programmed to transmit an authentication response from the authorization component to the computing client. The authentication response includes an authorization code. The authorization code represents a validation of the authentication request.
18 Citations
19 Claims
-
1. A secure authorization server for verifying an identity of an end user, said secure authorization server comprising at least one processor in communication with at least one memory, said secure authorization server programmed to:
-
receive, from a computing client, an authentication request including a first redirection uniform resource indicator (URI); associate the first redirection URI with responses to requests from the computing client; transmit an authentication response to the computing client, wherein the authentication response includes an authorization code representative of a validation of the authentication request; receive, from the computing client, a token request, wherein the token request includes the authorization code and a second redirection URI; transmit, in response to validating the authorization code and determining that the second redirection URI matches the first redirection URI, a token response to the computing client, wherein the token response includes an access token having a lifetime; receive, from the computing client, a user information request that includes the access token from the token response; and transmit end-user data to the computing client in response to a validation of the access token. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for verifying an identity of an end user, said method implemented using a secure authorization computing device including at least one processor in communication with a memory, the secure authorization computing device in communication with a computing client, said method comprising:
-
receiving, from the computing client, an authentication request including a first redirection uniform resource indicator (URI); associating the first redirection URI with responses to requests from the computing client; transmitting an authentication response to the computing client, wherein the authentication response includes an authorization code representative of a validation of the authentication request; receiving, from the computing client, a token request, wherein the token request includes the authorization code and a second redirection URI; transmitting, in response to validating the authorization code and determining that the second redirection URI matches the first redirection URI, a token response to the computing client, wherein the token response includes an access token having a lifetime; receiving, from the computing client, a user information request that includes the access token from the token response; and transmitting end-user data to the computing client in response to a validation of the access token. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage media having computer-executable instructions embodied thereon for verifying an identity of an end user, wherein when executed by at least one processor, the computer-executable instructions cause the processor to:
-
receive, from a computing client, an authentication request including a first redirection uniform resource indicator (URI); associate the first redirection URI with responses to requests from the computing client; transmit an authentication response to the computing client, wherein the authentication response includes an authorization code representative of a validation of the authentication request; receive, from the computing client, a token request, wherein the token request includes the authorization code and a second redirection URI; transmit, in response to validating the authorization code and determining that the second redirection URI matches the first redirection URI, a token response to the computing client, wherein the token response includes an access token having a lifetime; receive, from the computing client, a user information request that includes the access token from the token response; and transmit end-user data to the computing client in response to a validation of the access token. - View Dependent Claims (16, 17, 18)
-
-
19. A secure authorization server for verifying an identity of an end user, said secure authorization server comprising at least one processor in communication with at least one memory, said secure authorization server programmed to:
-
receive, from a computing client, an authentication request including a secure authentication request identifier and a first redirection uniform resource indicator (URI); associate the first redirection URI with responses to requests from the computing client; validate the authentication request by at least verifying that the secure authentication request identifier is valid; transmit an authentication response to the computing client, wherein the authentication response includes an authorization code representative of a validation of the authentication request; receive, from the computing client, a token request, wherein the token request includes the authorization code and a second redirection URI; transmit, in response to validating the authorization code and determining that the second redirection URI matches the first redirection URI, a token response to the computing client; receive, from the computing client, a user information request that includes an access token, wherein the access token is obtainable by the computing client based on the token response; and transmit end-user data to the computing client in response to a validation of the access token.
-
Specification