METHOD AND SYSTEM FOR SECURED INTER-APPLICATION COMMUNICATION IN MOBILE DEVICES
First Claim
1. A method for secured inter-application communication, comprising:
- transferring information from a first application in a mobile computing device to a second application in the mobile computing device using a second socket associated with the second application, the second socket opened by an operating system based on a request by the second application.
1 Assignment
0 Petitions
Accused Products
Abstract
This disclosure describes a method for accessing network resources which includes receiving by a first application in a mobile computing device sign-in information from a user and enabling the user to sign in to a second application with the first application to access network resources from a resource server based on (a) a first application identification (ID) of the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an authorization grant from the resource server to enable the second application to access the network resources, the mobile computing device coupled with the resource server via a network.
103 Citations
22 Claims
-
1. A method for secured inter-application communication, comprising:
transferring information from a first application in a mobile computing device to a second application in the mobile computing device using a second socket associated with the second application, the second socket opened by an operating system based on a request by the second application. - View Dependent Claims (2, 3, 4, 5, 6)
-
7. A computer-implemented method for accessing network resources using single sign-in information, comprising:
-
receiving by a first application in a mobile computing device sign-in information from a user; and enabling the user to sign in to a second application with the first application to allow the second application to access network resources on behalf of the user from a resource server based on (a) a first application identification (ID) of the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an access token from the resource server to allow the second application to access the network resources, the mobile computing device coupled with the resource server via a network. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. The method of claim 14, further comprising:
-
decryping the encrypted access token, by the second application, using the private key to generate a decrypted access token; using the decrypted access token, by the second application, to access the network resources from the resource server; and delivering the network resources, by the second application, to the user. - View Dependent Claims (15)
-
-
16. A computer program product, comprising a computer usable medium having a computer readable program code embodied therein, the computer readable program code adapted to be executed to implement a method comprising:
-
receiving by a first application in a mobile computing device sign-in information from a user; and enabling the user to sign in to a second application with the first application to access network resources from a resource server based on (a) a first application identification (ID) of the second application, (b) the user authorizing the second application to the resource server, and (c) receiving an access token from the resource server to enable the second application to access the network resources, the mobile computing device coupled with the resource server via a network. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification