SERVICE PROVIDER INVOCATION
First Claim
1. A method comprising:
- maintaining, on a non-transitory storage medium, user information associated with a user account for a service;
receiving, from a user device, a request to authenticate the user device to the service, wherein the request to authenticate the user device to the service comprises verification information;
sending, based on the verification information, authentication information to the user device;
receiving a request, from the user device, to access the service, wherein the request to access the service comprises the authentication information;
authenticating, based on the authentication information, the user device for access to the service; and
providing the user device access to the service.
5 Assignments
0 Petitions
Accused Products
Abstract
A service provider may provide one or more services to and/or for a client. Providing a service may involve receiving a service request including a security token at the service provider and determining whether the security token is valid. Providing the service may also involve determining a session security token if the security token is valid and generating a service response including the session security token. Providing the service may further involve receiving a service request including the session security token, determining whether the session security token is valid, and, if the session security token is valid, generating a second service response.
3 Citations
20 Claims
-
1. A method comprising:
-
maintaining, on a non-transitory storage medium, user information associated with a user account for a service; receiving, from a user device, a request to authenticate the user device to the service, wherein the request to authenticate the user device to the service comprises verification information; sending, based on the verification information, authentication information to the user device; receiving a request, from the user device, to access the service, wherein the request to access the service comprises the authentication information; authenticating, based on the authentication information, the user device for access to the service; and providing the user device access to the service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
at least one processor; and a non-transitory computer readable medium storing instructions that, when executed by the at least one processor, cause the system to; receive, from a user device, a request to authenticate the user device to a service, wherein the request to authenticate the user device to the service comprises verification information; send, based on the verification information, authentication information to the user device; receive a request, from the user device, to access the service, wherein the request to access the service comprises the authentication information; authenticate, based on the authentication information, the user device for access to the service; and provide the user device access to the service. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium storing instructions thereon that, when executed by a processor, cause a computer system to:
-
receive, from a user device, a request to authenticate the user device to a service, wherein the request to authenticate the user device to the service comprises verification information; send, based on the verification information, authentication information to the user device; receive a request, from the user device, to access the service, wherein the request to access the service comprises the authentication information; authenticate, based on the authentication information, the user device for access to the service; and provide the user device access to the service. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification