ASYNCHRONOUS IDENTITY ESTABLISHMENT THROUGH A WEB-BASED APPLICATION
First Claim
1. A computer-implemented method for establishing identity through a web-based application, the computer-implemented method comprising computer-implemented operations for:
- determining whether a user has been logged off from the web-based application accessed through a web browser on a computer;
upon determining that the user has been logged off from the web-based application, providing a new user interface through the web browser, the new user interface enabling the user to enter user credentials;
receiving the user credentials through the new user interface;
transmitting a request to validate the user based on whether the user credentials are valid;
upon transmitting the request to validate the user, receiving an instruction to remove the new user interface when the user is validated; and
upon receiving the instruction to close the new user interface, transforming a display of the web-based application by removing the new user interface.
2 Assignments
0 Petitions
Accused Products
Abstract
A determination is made as to whether a user has been logged off from the web-based application accessed through a web browser on a computer. If it is determined that the user has been logged off from the web-based application, then a new user interface is provided through the web browser. The new user interface may enable the user to enter user credentials. The user credentials are received through the new user interface. A request to validate the user based on the user credentials is transmitted. Upon transmitting the request to validate the user, an instruction to remove the new user interface is received when the user is validated. Upon receiving the instruction, a display of the web-based application is transformed by removing the new user interface.
77 Citations
20 Claims
-
1. A computer-implemented method for establishing identity through a web-based application, the computer-implemented method comprising computer-implemented operations for:
-
determining whether a user has been logged off from the web-based application accessed through a web browser on a computer; upon determining that the user has been logged off from the web-based application, providing a new user interface through the web browser, the new user interface enabling the user to enter user credentials; receiving the user credentials through the new user interface; transmitting a request to validate the user based on whether the user credentials are valid; upon transmitting the request to validate the user, receiving an instruction to remove the new user interface when the user is validated; and upon receiving the instruction to close the new user interface, transforming a display of the web-based application by removing the new user interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system, comprising:
-
a processor; a memory operatively coupled to the processor; and a program module (i) which executes in the processor from the memory and (ii) which, when executed by the processor, causes the computer system to establish identity through a web-based application by determining whether a user has been logged off from the web-based application accessed through a web browser on a computer, upon determining that the user has been logged off from the web-based application by identifying that a previous authentication token has expired or has been deleted, providing a new user interface through the web browser, the new user interface enabling the user to enter user credentials, receiving the user credentials through the new user interface, transmitting a request to validate the user based on whether the user credentials are valid, upon transmitting the request to validate the user, receiving an instruction to remove the new user interface when the user is validated, and upon receiving the instruction to remove the new user interface, transforming a display of the web-based application by removing the new user interface. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer-storage medium having computer-executable instructions stored thereon which, when executed by a computer, cause the computer to:
-
determine whether a user has been logged off from a web-based application accessed through a web browser on a computer, the user being logged off as a result of a passive log off or an active log off; upon determining that the user has been logged off from the web-based application by identifying that a previous authentication token has expired or has been deleted, provide a new user interface through the web browser, the new user interface enabling the user to enter user credentials, the new user interface configured to block user access to a server-side representation of the web-based application through the web browser; receive the user credentials through the new user interface, transmit, to an authentication server, a request to validate the user based on whether the user credentials are valid; upon transmitting the request to validate the user, receive an instruction to remove the new user interface when the user is validated, wherein the instruction to remove the new user interface is received from a web page to which new user interface is directed by the authentication server; and upon receiving the instruction to remove the new user interface, transform a display of the web-based application by removing the new user interface.
-
Specification