APPLICATION PROGRAM AS KEY FOR AUTHORIZING ACCESS TO RESOURCES
First Claim
1. A method performed by a client side application executed on a client device comprising:
- transmitting a request to an authorization service for access to a resource;
receiving from the authorization service a request for confirmation that the client device complies with a distribution rule associated with the resource, wherein the distribution rule requires a key application to be installed on the client device as a prerequisite to accessing the resource; and
in response to a determination that the client device complies with the distribution rule, accessing the resource.
2 Assignments
0 Petitions
Accused Products
Abstract
In a networked environment, a client side application executed on a client device may transmit a request to an authorization service for access to a resource. The authorization service may authenticate the user of client device and/or the client device based on user credentials and/or a device identifier. In response to authenticating the user and/or the client device, the authorization service may send to the client side application a request for confirmation that the client device complies with a distribution rule associated with the resource, where the distribution rule requires a specific application or specific type of application to be installed, enabled and/or executing on the client device as a prerequisite to accessing the resource. If the client device complies with the distribution rule, the client side application accesses the resource. Accessing the resource may include receiving an authorization credential required for access to the resource.
46 Citations
20 Claims
-
1. A method performed by a client side application executed on a client device comprising:
-
transmitting a request to an authorization service for access to a resource; receiving from the authorization service a request for confirmation that the client device complies with a distribution rule associated with the resource, wherein the distribution rule requires a key application to be installed on the client device as a prerequisite to accessing the resource; and in response to a determination that the client device complies with the distribution rule, accessing the resource. - View Dependent Claims (2, 3, 4, 5, 6, 19, 20)
-
-
7. The method of dam 1, accessing the resources further comprises receiving authorization to access the resource, wherein the authorization comprises an authorization credential required for access to the resource.
-
8. A client device comprising:
-
a network connectivity interface for enabling communication between the client device and an authorization service via a network; a memory for storing a client side application and a key application; a processor communicatively coupled to the memory for executing said client side application, wherein said client side application comprises executable instructions for; transmitting to an authorization service, via the network connectivity interface, a request for access to a resource, receiving from the authorization service, via the network connectivity interface, a request for confirmation that the client device complies with a distribution rule associated with the resource, wherein the distribution rule requires a key application to be installed on the client device as a prerequisite to accessing the resource, in response to determining that the client device complies with the distribution rule, receiving an authorization credential from the key application, and using the authorization credential to access the resource. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A network server comprising:
-
a network connectivity interface for enabling communication between the network server and a client side application executed by a client device via a network; a memory for storing a resource, an authorization service, and at least one distribution rule; a processor communicatively coupled to the memory for executing said authorization service, wherein said authorization service comprises executable instructions for; receiving from the client side application, via the network connectivity interface, a request for access to the resource, determining that the distribution rule is associated with the resource, wherein the distribution rule requires a key application to be installed on the client device as a prerequisite to the client side application accessing the resource, in response to a determination that the client device complies with the distribution rule, providing the client side application authorization to access the resource. - View Dependent Claims (16, 17, 18)
-
Specification