Methods for optimizing HTTP header based authentication and devices thereof
First Claim
1. A method for optimizing authentication, the method comprising:
- receiving by an application management computing device a request from a client computing device which requires authentication;
determining by the application management computing device when the request includes an authentication cookie;
authenticating by the application management computing device the client computing device based on a comparison of a set of user network identification information obtained from the authentication cookie to another set of user network identification information obtained from the request, when the determining indicates that the request includes the authentication cookie; and
sending by the application management computing device a challenge to the client computing device, authenticating the client computing device based on user credentials received in response to the challenge, obtaining the another set of user network identification information from the request, generating the authentication cookie based on the another set of user network identification information, and sending the authentication cookie to the client computing device, when the determining indicates that the request does not include the authentication cookie information.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, non-transitory computer readable medium and application management computing device includes receiving at an application management computing device a request from a client computing device which requires authentication. A determination is made by the application management computing device whether user network identification information currently is stored for the requesting client computing device. The stored user network identification information for the authentication is obtained by the application management computing device when the user network identification information is determined to be currently stored for the requesting client computing device. The authentication is completed by the application management computing device with the obtained user network identification information.
304 Citations
12 Claims
-
1. A method for optimizing authentication, the method comprising:
-
receiving by an application management computing device a request from a client computing device which requires authentication; determining by the application management computing device when the request includes an authentication cookie; authenticating by the application management computing device the client computing device based on a comparison of a set of user network identification information obtained from the authentication cookie to another set of user network identification information obtained from the request, when the determining indicates that the request includes the authentication cookie; and sending by the application management computing device a challenge to the client computing device, authenticating the client computing device based on user credentials received in response to the challenge, obtaining the another set of user network identification information from the request, generating the authentication cookie based on the another set of user network identification information, and sending the authentication cookie to the client computing device, when the determining indicates that the request does not include the authentication cookie information. - View Dependent Claims (2, 3, 4)
-
-
5. A non-transitory computer readable medium having stored thereon instructions for optimizing authentication comprising machine executable code which when executed by at least one processor, causes the processor to perform steps comprising:
-
receiving a request from a client computing device which requires authentication; determining when the request includes an authentication cookie; authenticating the client computing device based on a comparison of a set of user network identification information obtained from the authentication cookie to another set of user network identification information obtained from the request, when the determining indicates that the request includes the authentication cookie; and sending a challenge to the client computing device, authenticating the client computing device based on user credentials received in response to the challenge, obtaining the another set of user network identification information from the request, generating the authentication cookie based on the another set of user network identification information, and sending the authentication cookie to the client computing device, when the determining indicates that the request does not include the authentication cookie. - View Dependent Claims (6, 7, 8)
-
-
9. An application management computing device comprising at least one processor and a memory coupled to the processor which is configured to be capable of executing programmed instructions comprising and stored in the memory to:
-
receive a request from a client computing device which requires authentication; determine when the request includes an authentication cookie; authenticate the client computing device based on a comparison of a set of user network identification information obtained from the authentication cookie to another set of user network identification information obtained from the request, when the determining indicates that the request includes the authentication cookie; and send a challenge to the client computing device, authenticating the client computing device based on user credentials received in response to the challenge, obtaining the another set of user network identification information from the request, generating the authentication cookie based on the another set of user network identification information, and sending the authentication cookie to the client computing device, when the determining indicates that the request does not include the authentication cookie. - View Dependent Claims (10, 11, 12)
-
Specification