Brokering a connection to access a secured service
First Claim
1. A method, comprising:
- sending, to a server, a first request to connect with a secured service that is separate from the server;
receiving, from the server, negotiated authorization information generated by the secured service;
generating, using at least one processor, a second request to connect with the secured service, the second request to connect comprising the negotiated authorization information generated by the secured service;
sending the second request to connect to the secured service; and
synchronizing local data with remote data stored by the secured service.
5 Assignments
0 Petitions
Accused Products
Abstract
Leveraging a persistent connection to provide a client access to a secured service may include establishing a persistent connection with a client in response to a first request from the client, and brokering a connection between the client and a secured service based on a second request from the client by leveraging the persistent connection with the client. The brokering may occur before the client attempts to connect to the secured service directly and the connection may be established between the client and the secured service without provision by the client of authentication information duplicative or additional to authentication information provided by the client to establish the persistent connection.
160 Citations
20 Claims
-
1. A method, comprising:
-
sending, to a server, a first request to connect with a secured service that is separate from the server; receiving, from the server, negotiated authorization information generated by the secured service; generating, using at least one processor, a second request to connect with the secured service, the second request to connect comprising the negotiated authorization information generated by the secured service; sending the second request to connect to the secured service; and synchronizing local data with remote data stored by the secured service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
receiving, at a secured service, first authentication information from a client, the first authentication information used to temporarily authenticate the client with the secured service; receiving, at the secured service, a request from the client for second authentication information from the secured service, the second authentication information used to enable the client to access a resource of the secured service; generating, using at least one processor, the second authentication information at the secured service based on a determination by the secured service that the client is authorized to access the resource of the secured service; sending the second authentication information from the secured service to the client; receiving, at the secured service, a request from the client for the resource of the secured service, the request comprising the second authentication information; and providing the client with access to the resource of the secured service. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification